Sun
06
Aug
2017
现在门锁也是更新换代的飞速,自然安全系数也是越来越高了。锁具毕竟是个机械设备,因此使用时间长了必定会出现各种问题,下面我们就来看看防盗门锁常见的一些故障。
防盗门锁合页会响
产生原因:铰链响可能是因空气潮湿或安装防盗门铰链盒内进入灰尘,导致铰链与铰链销磨擦产生响声。铰链螺丝调节不当,合页插销不在同一轴线上。铰链固定螺丝未调紧,门在使用过程中在重力作用下铰链偏移不同轴。
解决方法:调节一下铰链螺丝使铰链插销在同一轴线上即可(门框中间铰链的两颗螺丝适当放松即)。在铰链销上注入液体润滑油或黄油。切勿使用物油或植物油(诸如猪油、豆油等)
防盗门锁外锁芯打不开
产生原因:外锁芯在受到外力的作用无痕蓄意破坏,使锁芯内部弹子错位,会使锁芯无法开启。被别有用心的人向锁芯内注入胶水和异物,会使锁芯无法开启。甚至不法分子利用技术开启工具拨动护锁片产生自动锁死,会使锁芯无法开启。
解决方法:清理干净异物,并加铅笔粉末后用钥匙开启别人蓄意破坏导致锁芯打不开,所以建议用户联系ARIA LOCKSMITH悉尼小伞锁匠更换新锁。
门锁发紧
一般人在门锁出现发涩、或发紧的时候,往往喜欢向锁眼里滴上一些润滑油,这样,可能立马使门锁通体顺滑了。殊不知,因为油易黏灰,以后锁眼里会容易慢慢积存灰尘,而形成油腻子,这样反而使得门锁更容易出现故障了。削一些铅笔碎末或一些蜡烛碎末,通过细管吹入锁芯内部,然后插入钥匙反复转动数次即可。
生活中门锁使用久了难免出现各种毛病,一些小故障我们可以自行解决,如果碰到大毛病要及时联系ARIA LOCKSMITH悉尼小伞锁匠上门解决。
Sun
06
Aug
2017
选择锁具要注意:一是用手感触锁的重量,越重的说明锁芯使用材料越厚实,耐磨损。反之,则材料单薄,易损坏。二是看锁具的表面光洁度,是否细腻光滑,无斑点。三是看锁芯弹簧的灵敏程度。
安全锁,锁安全,小伞锁匠ARIA LOCKSMITHS一方面为您提供安全专业的锁具,还提供快速稳妥的锁具安装服务!安全专业的锁具安装,就来找悉尼小伞锁匠Aria Locksmith!让您再无后顾之忧!
Sun
06
Aug
2017
Good security begins with a lock on all perimeter doors as well as selects interior doors. This includes the small cam and-drawer locks that commonly secure desk drawers, wall and floor cabinets, file cabinets, lockers, and other forms of personal storage.
“Whether we want to admit it or not, by the time the job is almost over, someone’s going to bring up the issue of security for the desk drawers and various cabinets that need to be protected,” says John Larkin, Senior Partner with Electronic Systems Consultants LLC (ESC) of Columbus, Ohio. “It’s somewhat understandable considering all the things that goes into a quality security system. But it’s something that must be done before we can honestly say we’ve left no rock unturned in our attempt to provide quality, effective security.”
In the past, most of the small locks that were used on these types of storage spaces were strictly mechanical. Cam locks equipped with wafers were the norm and certainly not the exception. It was often more convenient to purchase keyed-alike cam locks than it was to rekey them. This is because the cost of these locks was comparatively inexpensive to the cost of labor needed to remove, rekey, and re-install them.
The solution: use programmable electric cab/drawer locks that support connectivity with a local or cloud-based access control system.
Current Trends in Access Control
One of the most notable trends in the access control market today is the conversion of mechanical locks to that of electronic hybrids designed to operate in standalone mode or connect with a common ACMP (Access Control Management Platform)—whether local or remotely maintained in the cloud. In addition to regular door locks, this trend also applies to the electric locks that secure desk drawers, wall cabinets, drug carts, medicine cabinets, file cabinets, and other types of personal storage.
“IHS Technology (NYSE: IHS) estimates the world market for mechanical and peripheral locking devices was valued at $5.2 billion in 2013. This total includes products such as electromagnetic locks, electric strikes, mechanical locks, exit devices and accessories. Mechanical locks accounted for the largest portion of global revenues, at 43.2 percent in 2013” (Growth Trends in the Mechanical Lock Industry, Security Solutions, a hard-print magazine based in Australia).
The second trend of note to locksmiths is the ever-expanding need for more trust by design where it comes to those who use these systems. This leads us directly to a third trend, the ever-increasing use of mobile devices to program and operate these small electronic locks. The latter is becoming a significant part of what is now touted as the “Trusted ID” concept.
According to SecurityWorldMarket, formerly SecurityWorldHotel, Stefan Widing, president and CEO of HID Global of Austn, TX, believes that 2017 will usher in a broad range of smart devices that altogether will result in what the industry will come to know as ‘Trusted Identities.’ Widing says, “This will directly impact how customers view and use trusted identities on mobile devices and smart cards for more activities in more connected environments” (source: HID predicts shift in use of ID technology).
Possible Applications Include Healthcare
Many small drawer and cabinet locks can be controlled by an ACMP. Many of them come with features that exist in large access control systems. For example, HES, an ASSA ABLOY company, makes a computer server cabinet lock specifically to secure the data inside a LAN (Local Area Network), which is exactly the kind of physical protection required by HIPAA (Health Insurance Portability Protection Act) for the protection of digital patient data.
HIPAA strives to protect all forms of patient data, from the physical notes taken by a physician or other staff members to the digital data that is kept on or off site in computer networks. Physical and logical security plays a leading role in maintaining patient privacy. These small but powerful locks have become an integral part of this effort.
“So important is HIPAA that there are serious penalties for failing to maintain a reasonable degree of security. That’s why it’s so important that security companies and locksmiths, work together to protect written patient records as well as data storage servers in healthcare facilities,” says Larkins. “There is a regiment of small locks designed to fit almost every desk drawer and storage cabinet in existence. And by building them with the electronics necessary to process data and store information, we’re able to use them in a building-wide access control system. Our clients can use almost any kind of valid credential with them, including the customary keypad that requires a unique PIN to access them.”
Of course there are many other applications where access controlled drawer and cabinet locks not only make it easier and faster to “rekey,” but now we’re able to store historical information in the form of an audit trail. An audit trail is a log that contains every person that has accessed the system. Not only does this include the person who initiated the event, but it also includes the day and time, the door used, and other information deemed necessary—even video surveillance footage of the event. Not only does this work well in healthcare settings, but it’s a slam dunk where it comes to securing personal items that belong to employees and visitors, such as lockers in certain areas of a hospital, such as a Radiology Department; bus stations; and elsewhere. This also includes school hallways, gym locker rooms, classrooms, corporate offices, general labor force, and more.
Electronic Processing and Data Storage Protection
One of the most important elements associated with site protection is that of network security and signal integrity in a LAN (Local Area Network) environment. Where logical security is handled by IT (Information Technology), physical security falls within the domain of savvy, knowledgeable locksmiths. A good example of a small electronic drawer/cabinet lock capable of securing server cabinets as well as other means of storage is the KS100 Series lock, made by HES. This one is designed especially for use with server cabinet doors with a standard 25mm (nearly 1 inch) x 150mm (approximately 5.9 inch) lock opening. The lock itself is only 1-21/32 inches wide by 8-1/2 inches tall.
According to HES, the KS100 uses existing ID badges so there are no keys to control or replace and no codes to secure or remember. The KS100 protects servers from malicious or accidental tampering by adding a credential. This includes a HID proximity (125 kHz) or HID iClass (13.56 MHz) credential.
From a strength point of view, the KS100 lock carries a Grade 1 classification and is fully encrypted using AES 128-bit wireless. You can power the lock using a POE (power over Ethernet) connection, thus saving the effort and cost of a separate local power supply. However, where it’s impractical or impossible to install Ethernet cable, the KS100 will operate using local power in the form of a plug-in transformer.
Communication with an access control system is carried out using 802.15.4 radio technology via an Aperio hub, which itself connects to an access control network using wired Ethernet. For additional information on the KS100 by HES,
Convertible Use of Electronic/Mechanical Locks
The RFID Combi-Cam E Lock, manufactured by FJM Security of Lynwood, WA, also is designed for use with wall cabinets, server cabinets, and other containment devices. A full electronic keypad enables users to utilize a simple PIN or that of a RFID (Radio Frequency Identification) card. Also acceptable are keyfobs and/or ID bracelets.
According to the RFID Combi-Cam E Lock manufacturer, the lock offers an ergonomic, compact form cabinet lock that makes it more versatile in more applications. The battery life within the lock is rated at 10 years. The physical design of the lock also makes it a practical replacement in most cases because of the hole opening requirements is so close to other manufactured locks.
According to FJM Security, the CombiCam E retrofits any cabinet lock application without permanent, further cutouts required to make the lock fit. The CombiCam E standard offers a variety of optional programming features and the RFID version adds yet a few more. A low battery indicator flashes for 250 uses and a temporary battery supply is easy [to create] by simply connecting a [charged] battery to the two light nodes long enough to enter the code and open up the lock
Remote Lock Management
LockeyUSA’s EC Series electronic cabinet and locker locks include seven electronic combination locks, available with three modes: public mode, private mode and Remote Allocation System (RAS) mode, which enables administrators to remotely manage all locks.
The Remote Allocation System is an online code management system available on all keypad locks in the EC Series. Through the online portal, administrators can view a detailed overview of all the locks the currently manage. The lock list provides information such as the serial number, location of the lock and who the lock is currently allocated to.
Adminstrators can manage a single lock code by clicking “Update.” They can change all codes at once by clicking “Manage” followed by “Advance Lock Codes.”
Increased Use of Near Field Technology
Another notable trend in the use of electronic locks, whether they’re connected to an ACMP or not, involves the use of NFC (Near Field Communication). This makes it possible for locksmiths to program the electronic locks they install.
The use of NFC is growing. According to ESC’s Larkin, he first noticed the use of NFC in the security market when installers began programming alarm panels using a smart phone or tablet. “The locksmith ESC partners with uses a NFC-enabled tablet when installing the Kitlock 1550 Smart, made by Codelocks of Irvine, CA.”
The Kitlock 1550 Smart uses NFC for programming, as well as SMS through what the manufacturer calls NetCode. In addition, NetCode can be used over the Internet to do the same things, and more.
The lock itself is a multi-purpose drawer/door lock especially suitable for use with lockers. It comes with a 12-button keypad and supports a 4-digit end user pass code as well as a 6-digit technician service code and an 8-digit sub-master code. For additional information on the KitLock 1550 Smart lock, go
Tue
29
Dec
2015
不同于商用五金标准,民用五金配件用久了,容易出现这儿、那儿的诸多毛病。尤其是门锁,这种高负荷运作的零部件,使用寿命长了,难免会出现一点儿故障。经常发现一些用户和朋友们,家中门锁的损坏往往是因为使用或养护不得当而造成的。
aria locksmith 小伞锁匠告诉您门锁保养注意事项:
一、不要随便使用润滑剂
有些朋友们在门锁出现发涩、或发紧的时候,往往喜欢向锁眼里滴上一些润滑油,这样,可能立马门锁通体就顺滑了,但因为油易黏灰,以后锁眼里会容易慢慢积存灰尘,而形成油腻子,这样反而使得门锁更容易出现故障了。
正确的解决办法:削一些铅笔碎末或一些蜡烛碎末,通过细管吹入锁芯内部,然后插入钥匙反复转动数次即可。
二、不要强力扭动钥匙开门
一些时候,由于门扇自身重力原因,或门活页原因,导致门扇下沉,出现锁门或开门不顺畅现象。这个时候往往是用钥匙开门、锁门非常吃力。此时,不要强行扭动钥匙,以免掰断钥匙,增加麻烦。
Tue
22
Dec
2015
Yavne, Israel -- Mul-T-Lock® announced the launch of its dynamic, new website for ENTR™ –ENTRlock.com – the ground-breaking digital, keyless locking system for the residential and small business market. ENTRlock.com was designed to help consumers understand how they can transform their homes into smart ones, starting with their locking systems.
ENTRlock.com offers a glimpse into the emerging world of smarthomes. The site was designed for user-friendly experience that’s easy to navigate. It provides clear and visual guidance about ENTR™’s features, how it used, where to find a local dealer and intuitive technical support.
ENTR™ is in line with today’s digital lifestyle. It’s a key-free smart locking solution where users can select how they operated it – smartphone app, personal code, fingerprint, or remote fob – whatever works best or a combination of all. Furthermore, ENTR™ was designed for sustainability, from its rechargeable batteries, elimination of keys, remote technical support and through to its almost 100% recyclability.
“Created with the user experience in mind, the new ENTRlock.com is a beautifully designed website that provides the ultimate user-friendly experience, allowing customers to access product information and videos and then share it all across all major social networking sites,” said Kineret Muller, Marketing Director, Mul-T-Lock®. “We used the latest technology so the site is compatible with today's browsers and mobile devices.”
First launched in January 2015 to resounding success and demand, the ENTR™ locking solution is now available in over 30 counties, across 4 continents and distributed by an extensive partner distribution network.
Sun
20
Dec
2015
盗贼作案的基本程序 专事对居民住宅入室盗窃盗贼的特点特征
这类专事入室盗窃的盗贼,时间观念较强,因而要以其作案时间的习性,分为两类,即白日入室盗贼与夜间入室盗贼。
白日入室盗贼之所以喜欢在白天作案,是因为他们认为:白天,主人不在家中,撬门入室盗窃不易被发觉,较为安全可靠。大多数这类盗贼都是窜到居民区住宅大楼,工厂的宿舍区等地,假扮成找人或者串门的模样,到了门前先敲一下门,试探看看是否有人在家中。若是无人来开门,确定室内无人时,便拿出作案工具快速撬门破锁入室行窃。
若是有人来开门或者有邻居过问,盗贼便乱报某人姓名,问某某人是否是住在此处。当对方回答没有此人时,盗贼便说“对不起,拍错门了”之类的话语用以掩护,然后迅速离开。这其实是盗贼惯用的招数之一。
有的盗贼作案前较为懂得伪装。例如有一名惯窃,他每次去作案都拎着一袋水果或者礼品盒(其实盒内是空的或者乱装一些东西,在盗窃得手后就随手丢掉)。他这样伪装,不易引起别人的怀疑和注意。当确定无人在家中时,他便下手作案。还有的的盗贼假装成上门推销员或其它的(如换煤气,送快餐等)
这类白日入室盗窃的盗贼,他们选择的作案地点多是喜欢那些住宅大楼和商品房。其中的原因是他们掌握了现代人“事不关已,高高挂起”,“各人自扫门前雪,哪管别人瓦上霜”的心理,以及不少城市人胆小怕事的通病。
如今,过去常说的“远亲不如近邻”已成为旧话。在以前,人们多是居住在大杂院里,邻里关系比较密切,有的还亲如一家人。
所以,窃贼不敢轻易对大杂院下手。据有关资料统计:大杂院的入室盗窃案发案率是最低的;
有的地方大杂院几十年来从未发生过入室盗窃案。现在邻里关系变得如此麻木与冷漠,
都市人是在远离了大杂院,搬进了钢筋水泥筑起的高楼大厦后,心态逐渐变得坚硬和冰冷起来的。这种坚硬与冰冷是如今现代人的通病,是没有良药和秘方可以治愈的。甚至有的人连对门住的是何人也不认识。
最近,南京市的一次城市调查揭露:如今“远亲不如近邻”已成历史和旧话,城市邻里关系很少能达到如此亲密程度。
在调查被访者中,不到两成的人熟悉所有的邻居,只有四成的人认为在邻居中只熟悉个别人或者只是有点头之交。被访者很少人把邻居列为好友
,只有一成的人认为自己和邻居关系很密切,有近四成的人认为自己和邻居关系一般,另近半数的人认为自己和邻居关系比较疏远;
多数人还承认乔迁之后,不会主动拜访新的邻居。 由上述阐述调查不难看出,那些居民小区和商品房成为入室盗窃发案率最高,
窃贼频频光顾的原因是什么。 这类白日入室盗窃作案的盗贼,他们作案都有一定的规律,对时间掌握得很准,基本上都是上午8点半至11点与下午14点半至16点半这两段时间作案。因为在这两段时间内,那些有工作,在工厂、公司、事业单位上班的人们,都正在上班,不在家中,而那些做生意,忙于生计的人在这个时候也都是外出。若是家中有小孩的,在这段时间也是在学校或者幼儿园里。即便是有些家庭有家庭主妇或者老人的,在这段时间也会外出玩耍或者到菜市买菜之类的,无人看家。
因此,这段时间是那些白日撬门破锁入室行窃作案的盗贼的最佳黄金时间。此类案件发生也多是在这段时间内。
有这样一个案例:
有一伙盗贼,他们窜到某地教师宿舍大楼,接连扫荡,撬了十多户人家。他们就是利用教师白日正在上课,无人看家,而大肆无忌疯狂作案,从一楼撬到七楼,连开14户。
某报刊刊登了这样一个案例:地处武汉市紫阳路武汉大学医学院附属卫生学校的学生宿舍寝室,在下午14点至16点这段时间,学生都在上课,有窃贼连接偷了4层楼,75间寝室,被盗钱物等东西不计其数。
可见,这类盗贼都是利用白日无人在室内,掌握时间差进行入室盗窃的。
那么,这类盗贼是如何判断室内无人呢?其断定方法有很多种,除了前面所说的假装串门,找朋友、拍门之外,还有很多方法
,例如在以前,家庭拥有电冰箱,空调器等不需断电的家用电器较少,且每家每户的电表基本上都安装在门外上方的墙上,盗贼只需观察电表是否正在运转,就能断定室内是否有人。这是因为:在热天,室内有人的话,肯定会开电风扇或者使用其他电器;在冷天,也会使用电器取暖等。这样,电表则会快速运转。盗贼判断室内有人,则不敢作案。但现在,盗贼这一招已不灵验了。因为几乎家家户户都拥有各种家用电器(除少数单身汉,不需要那么多电器外)不管是热天,还是冷天,电表都因电器正在使用而运转。所以,盗窃无法判断室内是否有人。
如今,城里人外出或下班回家,开门时,常发现门上有塞有一张或一叠花花绿绿的上门广告。这些由商家或者厂家自己编印的推销护肤品、化妆品,保健药品及各类食品家用电器的印刷品广告,虽在一定程度上起到了广告宣传效果,但多数人却厌烦地称其为——都市里的“新公害”。
时下,众多人消费看到电视和报刊发布的广告后,都惦量再三,裹足不前,唯恐被“不坦诚”的广告蒙骗。可想而知,在此心理的支配下,谁还想念未经有关部门审查批准而私自编印的上门广告呢?上门广告之所以称为社会“新公害”,不仅是它虚假,引人上当受骗,而且还有“引狼入室”的巨大危害。近年来,从上门广告在门缝中的积存,盗贼由此判断此家是否有人,从而使入室行窃屡屡得手。此类案件的发案率逐年上升,不能不引起人们的警惕。
许多家庭住户的门缝,门拉手都插满各色各样的广告。门外广告宣传品插得过多,说明户主有一两天没有清理,狡猾的盗贼就由此判断,户主一家人肯定外出不在家,不是出差,就是旅游之类的。于是,盗贼便敢于大胆行窃。
也有一些盗贼手中拿着一沓广告宣传单,假装成发广告或搞推销的。若无人盘问,又无法确定无人在家,盗贼便假装拍门,发广告、搞推销,以此来试探是否有人在家。如果有人开门问,盗贼就说是发广告,搞推销的。或者上门搞维修的等等为理由。当确定无人便会立即下手作案。
现在有些家庭都安装有固定电话电话,一些盗贼千方百计(例如查阅电话号码本)弄得作案对象家中的电话号码,以打电话来试探是否有人接电话,由此判断是否有人在家。若是有人接电话,盗贼便乱问一个姓名,户主肯定说打错了,则知道有人在家。若无人接电话,盗贼便推定此家无人,即动手作案。
以上所叙,是那些白日专门入室盗窃作案的盗贼的特点特征
Mon
14
Dec
2015
The home of Sydney celebrity butcher Anthony Puharich has been broken into with thieves taking more than $280,000 worth of jewellery and watches.
Police were called to the Brighton Boulevard home at North Bondi on Sunday afternoon after the Puharich family returned home from a night away to find their front door had been prised open and their valuables taken.
The burglary is believed to have taken place sometime between 5.30pm Saturday and 2.30pm on Sunday.
"[They are] devastated as anybody would be having their home invaded," acting crime manager, Inspector Michael Todd, said. "It's an invasion of privacy."
Mr Puharich is the co-owner of top-end Woollahra butchery, Victor Churchill, which describes itself as the "Bulgari of butcheries". He also established Vic's Premium Quality Meats with his father Victor Puharich, that now supplies to some of Sydney's top restaurants.
He also hosts a pay-television show Ask The Butcher.
Police are investigating if the home was specifically targeted or if it was an opportunistic break-in. They are obtaining security footage from neighbouring properties.
Inspector Todd said the burglary was a timely reminder for people to ensure their homes are locked up and anything valued or treasured put away.
Anyone with information or who might have seen suspicious behaviour is urged to contact Eastern Suburbs police.
Mon
14
Dec
2015
为避免越来越多的入室抢劫案的发生,悉尼开锁专门设置针对性的防盗知识,一起走进大讲堂。一,防盗窗的安装:对于较低楼层的住户,例如一楼,二楼的,安全防盗窗是必不可少的,一些小偷会借助楼层低而趁机入室,安装防盗窗之后不仅阻碍了小偷的脚步,而且可以保护家中的小孩子,以免爬窗,出现安全隐患。安装防盗窗尽量使其与墙保持与一个平面内,不要因为美观而选择一些不实用的防盗窗。
二,定期更换锁具:锁具是针对小偷的最大拦阻,锁具的好坏,坚固与否直接影响了小偷的脚步。不要购买那些简单,便宜的锁,例如弹簧锁,经过训练的小偷轻易就能打开它,所以,要购买一些叶片锁或者月牙锁,此种锁防御能力较强,安全性高。
三,加固卷帘门:不要以为卷帘门特别牢固,其唯一好处就是使用简单,其实卷帘门防御能力并不强,所以要加固锁在卷帘门的两头的底部,最好选择安全性能高的月牙锁。
四,提高防范意识:进出门切记要锁好门,出门关闭门窗,不要给小偷一可趁之机;开门后记得要拔钥匙,以防小偷发现偷偷再配一把。可以在家门口或者家中安装摄像头,做好监控工作。
Mon
05
Oct
2015
不同于商用五金标准,民用五金配件用久了,容易出现这儿、那儿的诸多毛病。尤其是门锁,这种高负荷运作的零部件,使用寿命长了,难免会出现一点儿故障。经常发现一些用户和朋友们,家中门锁的损坏往往是因为使用或养护不得当而造成的。
一、不要随便使用润滑剂
有些朋友们在门锁出现发涩、或发紧的时候,往往喜欢向锁眼里滴上一些润滑油,这样,可能立马门锁通体就顺滑了,但因为油易黏灰,以后锁眼里会容易慢慢积存灰尘,而形成油腻子,这样反而使得门锁更容易出现故障了。
正确的解决办法:削一些铅笔碎末或一些蜡烛碎末,通过细管吹入锁芯内部,然后插入钥匙反复转动数次即可。
二、不要强力扭动钥匙开门
一些时候,由于门扇自身重力原因,或门合页原因,导致门扇下沉,出现锁门或开门不顺畅现象。这个时候往往是用钥匙开门、锁门非常吃力。此时,不要强行扭动钥匙,以免掰断钥匙,增加麻烦。
安全性、稳定性极为重要
门锁作为安全防范产品必须具有安全性、稳定性。安全性可从两方面来衡量:一是抵抗故意破坏、恶作剧和蓄意的撬、钻等暴力破坏。在此方面,目前机械锁和电子门锁的机械强度一般都能够达到要求。而在所有各类门锁中,只有射频卡电子门锁是全封闭结构,其安全性最好。
二是防范技术开启,机械锁的防技术开启的能力很差。不管那种结构的机械锁都可被其他手段开启。钥匙可以复制就是很大的安全隐患。在电子门锁中,磁卡因无密码限制,其钥匙卡易被复制。IC卡和射频卡则彻底解决了防范技术开启的问题。
作为门锁,其稳定性同样非常重要。在应开门时开不了门,该关门时关不了门可能给金融企业带来严重损失。一般来说,几种电子门锁中,射频卡电子门锁稳定性明显高于其他电子门锁。磁卡怕强磁场,IC卡怕油污、灰尘和静电(尤其干燥天气下和毛纺品放一起),而射频卡具有全密封、防水、防静电、防灰尘的特点。从读卡方式上讲,只有射频卡读卡不接触,其使用寿命最长。
Mon
14
Sep
2015
Mon
14
Sep
2015
澳洲抑制盜車協會(抑盜會)(National Motor Vehicle Theft Reduction Council,NMVTRC)發佈最新數據,去年每一千輛註冊汽車中就有4輛被盜。這幾乎是南澳和塔斯馬尼亞的兩倍,也高於任何其它省,包括維多利亞(2.6/1000)、昆士蘭(2.9/1000)和新南威爾士(3.2/1000)。
為玩車和犯罪而盜車的比率有所下降,與此同時,為獲利、為汽車零件以及拆卸有用金屬,以及為了非法出口而盜車的百分比則上升了30%。在其它省,以獲利為目的的偷車行為則保持原比率。因此, 抑盜會要求加強管理二手車零部件,使被盜車及其零部件更難以出手。
西澳警察署數字顯示,上年共失盜8,496輛車,平均每24小時23輛。這比去年下降7%,但高於2011-2022(8,197),2010-2011(7,269), 2009-10(6,245)。這意味著西澳駕車人在汽車失盜保險上猛增投保金,據抑盜會估計增加了10%的保險金。Holden Commodore VE、VT 和VX是主要盜竊目標,其次為Toyota Hilux和Ford Falcon。
最近的西澳警署社區調查顯示,有46%的西澳人非常擔心或擔心今年自己的汽車被盜。當局承認,西澳世界首創的強制安裝汽車防盜系統的法律誘發了新型犯罪。現在,3個被盜客車裡就有兩個是盜車賊潛入民宅,盜取車鑰匙後從車庫裡或車道上開走汽車。
抑盜會戰略部主任休斯(Geoff Hughes)表示,強制安裝汽車防盜系統降低了被盜車的總數量,同時也引發了盜取方式的重大改變。「伺機行事的竊賊需要車鑰匙,為此,他們準備潛入民宅。」他說。西澳警署說,如果車主保管好他們的車鑰匙,盜車賊就會失業。
休斯說,廢金屬加工業促成了失盜車的25%,雖然把車當做廢金屬來賣只能得到300澳元。有10%的被盜四輪驅動車和商用車被用於整體或零件出口,主要目的地是中東和西非。西澳汽車商會同時警告說,這些車被改裝或翻新後看起來像頂級模型,價錢很高但無安全功能。
西澳警方發言人新創建的「打擊盜車賊」專項部已幫助降低了每年8.3%的盜車率。警察廳代理廳長戴伊(John Day)說,省政府正在加強入室行竊法來幫助堵截盜車賊。「警署知道許多車被盜是由於家門未鎖,使竊賊得以偷走車鑰匙,所以,車主們現在可以通過鎖好家門保管好車鑰匙來幫助打擊盜賊。」他說。
車道上丟車案例
DIANELLA區的水泥匠阿斯通(Adam Astone)一個週六上床睡覺,他的車停在自家的車道上。當他醒來時,他的1977年型的Holden Commodore SS(他花費1萬5千澳元定制的車)不見了。他是每年數以千計的偷車受害人之一,Holden Commodores在西澳被盜車排名榜上名列第一。
「我鎖了車,我還有一個防盜器,車窗也關上了。但他們還是把它弄走了。」20歲的阿斯通說,「他們真是在行,我怎麼也搞不明白他們是怎樣偷走它的。」「我太傷心了,我在這輛車上花費了大量金錢和時間,我愛它,它是我的自豪和喜悅。」「我也沒錢再買一輛了。」
車賊行竊時間是在週六夜間1:30至早上8:00之間。該車被攝像頭拍到在Roe Highway超速行駛但警方迄今未能再次發現它,阿斯通已對再次見到它不抱有希望。
他說,他要確保下輛車必安裝GPS追蹤儀和頂級報警器。「我知道有很多人偷車,但你怎麼也想不到被盜車的人會是你,你聽說這些,但你想不到你會是其中之一。」他說,「它就停在屋前,就在客廳窗下,但我們沒有聽到任何響動。」「我一直以為DIANELLA是一個好區,但也有偷車的事發生。無論哪裏都有這種事。」
Armadale是最重災區
Armadale是西澳盜車重災區,而帕斯機場也是頭5名可能丟車的地方。抑盜會新數據分析認為,2013-2014年度,Armadale有84輛轎車和輕型商用車被盜。
Bayswater是第二名可能丟車的地方,有67輛車被盜;Rockingham有65例;Gosnells有63例,都是西澳省盜車熱點。在珀斯機場停車不無風險,上一個財政年共有54輛車被盜。
Maddington、Scarborough和Baldivis也在大都市區盜車熱點名單上,遠郊則有South Hedland和Newman屬於熱門區域,2013-14年度各有51輛車被盜。
珀斯機場被遺棄的失盜車數量也很多,去年共有48輛車被遺棄在機場停車場,2014年迄今又有40輛車被遺棄。機場事務執行總經理蘭德(Fiona Lander)說,許多被遺棄車是不宜上路的轎車和貨車,隸屬於背包客,他們在登機前把車丟棄在機場。
這些車在機場停車90天,保留另外90天,在登廣告兩週後仍無人認領的,將被賣給機場職工。
知情人透露盜車機密
一名前認罪的盜車犯透露盜車賊挑選目標的要領,車主應怎樣避免成為犧牲品。
這位改造後的犯人成為珀斯一名房屋油漆匠,化名史提芬,他說,某些車型是盜車賊最想要的目標。「Holden Commodores是最常見的被盜車,因為市場對零件的需求很大,而這種車的零件很好拆卸。」他說。
史提芬說,他本人避免偷光線好地方的車,也不偷大路旁邊或安裝報警器的車。「車多的地方比車少的地方好,因為選擇多,通常你可以發現你想要的車型。」他說,「但你不想旁邊有人,我通常是在凌晨動手因為那時四下無人。」
「最蠢的是那些去音像店或報攤而車子依然發動著的人。」「你會驚奇地發現有多少人把備用鑰匙放在手套箱或中控臺裡,你在10秒鐘內就可以找到。」史提芬說,車主停車時把車窗開一條縫散熱,同樣給盜車賊「下了請帖」。
最安全的車
小車:VW Polo five-door
hatch
中小車:VW Golf five-door hatch
中型車:Audi A4 and VW Passat
大車:Jaguar XF
雷克薩斯:VW Tiguan
敞篷跑車:BMW 1 Series convertible and 3 Series
coupe
(來源:抑盜會)
最易被盜的車前10名
Holden Commodore VE
Holden Commodore VT
Holden Commodore VX
Toyota Hilux
Ford Falcon BA
Holden Commodore VY
Holden Commodore VZ
Ford Falcon FG
Holden Commodore VS
Hyundai Excel X3 2013-14
如何防範盜車犯
—當你在家時也要嚴鎖門窗;
—不要把車鑰匙留在容易發現的地方;
—把車鑰匙藏在保險的地方;
—不要把車鑰匙放在近門窗處;
—如果你在加油站,不要把車鑰匙留在打火孔。
Sun
23
Aug
2015
Catch one incident on a video camera system and the original cost of the system becomes worth every penny. Video surveillance has become the norm. Evening news broadcasts routinely show crimes, vehicle accidents and policing actions as they happened.
Video surveillance is not confined only to public situations. Abus has recently developed a video surveillance system which can be used in a residential setting to remotely view the movements of children, see who is at the front door or who is arriving in the driveway. Similar uses for the Abus video surveillance system might be in a business office or at a convenience food store. The basic Abus model TVAC16000 includes a 7” touchscreen monitor, a docking station and one wireless camera. Additional cameras can be ordered and up to four cameras can be integrated into the Abus surveillance system.
Communication between the camera and touchscreen monitor are wireless. The camera has a wireless range of 492 feet. Built-in LEDs allow an infrared night vision range of 26 feet. The camera can be used indoors or outdoors as needed. A tiltable camera mount is also furnished. Both video and audio information is recorded by the camera. Motion detection is an added camera capability. Both the camera and monitor require 5 VDC power from furnished power supplies. Internal batteries in the console can supply power for approximately 1.5 hours in case of a power failure.
During initial startup of the Abus video surveillance system, the camera(s) must be ‘paired’ to the monitor. Simple-to-use icons displayed on the monitor screen make pairing an easy job. Icons are marked 1-4. Each camera used in the system must be paired by pressing an individually numbered icon.
A free App for either Android or iOS allows users to remotely access the video surveillance system. This App is free in the App Store under the name “TVAC16000.”
Instructions included with the Abus Video Surveillance set show how to determine the computer network IP address, security code and other information. Once network settings have been completed, a furnished cable connects the Abus monitor to the network router. The final step is camera installation. Before final installation, each camera must be tested to make sure that it is in the available wireless transmission range.
The monitor screen contains three icon buttons. Button choices include ‘Live View’ ,’Event List’ and ‘Settings.’
LIVE VIEW: The Live View console screen provides choices for viewing an individual camera display: either a split screen showing views from all connected cameras or a sequenced display showing individual views from each camera for 5 seconds.
EVENT LIST: Recorded events are automatically saved and sorted according to the date. Prior events are recorded in both audio and video form. Prior events can be deleted from memory. Events are saved to an SD card (not included). Amount of events which can be saved are dependent on the memory size of the SD card.
SETTINGS: Items on the Settings screen include camera setup, recorder setup, network setup, alarm setup, system setup and a FAQ assistance section. Additional logos in each setup section simplify the setup procedures. Alarm tones sound if you have saved a timer setting or as a reminder at a certain time.
Tue
30
Jun
2015
悉尼的公寓楼房热潮不断,高层建筑高耸林立,信箱邮件失窃及身份欺诈的事件在不断上升。警方称,经小伞锁匠aria locksmith修锁开锁换锁装锁调查发现有组织的犯罪集团正把目标对向高层建筑的信箱。
据悉尼小伞锁匠aria locksmith 调查,地方警察局已在最近几周发出警告,通知公寓楼居民小心窃贼,更好地保护自己的邮件,对于信用卡或其它形式的证件要亲自去取。
纽省欺诈和网络犯罪小组的指挥官卡绍基安尼斯(Arthur Katsogiannis )说:“在过去几年中,邮件盗窃已成为日益严重的问题,经小伞锁匠aria locksmith修锁换锁装锁开锁调查发现主要在悉尼都市区。”
公寓楼对于邮件窃贼是一个诱人的选择,因为公寓楼的信箱多设置在一个僻静的位置,便于窃贼光顾。小伞锁匠aria locksmith 修锁开锁换锁 装锁调查发现他们可以在很短的时间内收集大量的邮件,如果他们有了万能钥匙,可以更容易地打开建筑物的每个邮件信箱。
虽然预先激活的信用卡是他们的主要目标,但像驾驶执照、医疗保险卡等也常常被盗,从而导致身份被盗用。
整个大都市区这类案件的官方统计数字目前还不清楚。卡绍基安尼斯说,偷盗信件可归类为 “从住所偷盗”的行为,如同入室偷盗或从前院草坪盗窃的罪行。
但是与欺诈事件联系在一起,以下两组数字可以清楚地看到邮件盗窃和身份证盗窃正在增加。
在高层公寓楼不断增长的城市地区,“从住所偷盗”的比率增长最加严重。小伞锁匠aria locksmith 修锁 换锁 装锁调查发现在过去的五年中,在加拿大湾(Canada Bay)和莱德(Ryde)地方政府管辖区内,该比率年增长11.4%;北悉尼(North Sydney)增长了11.3%;在帕拉马塔(Parramatta)10.1%;罗克代尔上升了10%;在悉尼市区年增长率为5%;伍拉拉(Woollahra)为5.9%。
与此同时,“盗窃事件(欺诈)”案件的年增长率,在莱德为17%;在加拿大湾为7.4%;悉尼市区为11%。经小伞锁匠aria locksmith开锁修锁换锁装锁调查发现该类犯罪在许多都市外围地区与悉尼周边地区也有显著上升。
卡绍基安尼斯说,虽然这些罪行不能直接归因于盗窃邮件,但“邮件盗窃与身份欺诈之间有很强的相关性。”
他表示,警方特别担心有组织犯罪集团手中盗取的身份证件,它们可能与飞车党和中东或东欧背景的犯罪集团有关。
Tue
30
Jun
2015
悉尼是个大城市,大城市都比较乱,这是共识.但我家所住的区治安一向认为挺好,我们也大意了.(大家不用问是哪个区了,实际上那个区都一样的)。 我家没有装alarm,认为alarm只会乱叫,防贼没啥用,但就因为没有装,才会有以下的结果。
去年下半年一天,我5点多下班回家,遥控器遥控大铁门不开,遥控车房门也不开。去邻居家问了,没有停电。后来我们只好从2米高的大铁门爬进去。这时天已经很黑了,进去打开房子大门,灯打不亮,但一踢就踢到地上很多破了的可乐罐。我马上知道,贼来过了。
我们马上去检查电箱,发现有人把电源的总闸给关了。把电接上后进屋一看,家里乱得一团糟。可乐汽水喷到每面墙都是,Plasma电视机/音响喇叭全部被打烂,床垫/皮椅/沙发被刀割破,西瓜被扔到天花板上摔下来,西瓜水流到整个饭厅到处都是,墙上被画得乱七八糟。总的来说,就是一片狼藉。
当时我也管不了那么多了,拿起手机就报警。接线员说叫我们不要进去,警察给我们联系。我们就在院子里等了两个多小时,警察打电话来说,叫我说说情况,他们太忙了,来不了。我把情况说了一下,他们觉得情况严重,结果半小时后来了。后来,在他们的陪伴下,我们把整个房子检查了一下,发现贼是从主人房的一个小窗爬进来的(小伞锁匠建议大家所有窗户上好锁)。因为我家有大铁门,他们打不开,没法把东西搬出去,只偷了现金,一点首饰,和所有的游戏机(Wii, PSP, Etc.).警察来除了把房子搞的更脏以外,什么用也没有。后来还是保险最有用,保险公司把所有东西都赔了,包括从新油墙,洗地毯等等.最后花了整整一个月,家里才恢复正常。
我们从中国来,只是想到贼偷点东西,哪里想到这里的贼不缺吃,不缺穿,就是来搞破坏的。这种搞破坏比偷东西要可恶的多,带来的麻烦多多了。所以,装报警系统很重要,至少减少了这种麻烦。
再来谈一下保险
我家是用NAMA,我们对他们的服务非常满意,他们也对我们非常满意,因为我们家N年如一日的在他家买所有的保险。各家保险公司的理赔政策会有不同,我说的只是我买的这个Policy的理赔方法。
所有损害的东西,偷掉的东西都能赔,以警擦纪录的为证。所以,警察虽然没有用,但一定要叫,没有他们的纪录,拿不到理赔。小伞锁匠aria locksmith 修锁 换锁 装锁调查发现警察纪录完,就可以报告保险公司。当晚,保险公司就安排了人来修玻璃。第二天,就有一个专门负责Home理赔的顾问来看什么东西要修,看得非常仔细。当然,最好是自己事先也有个数,他漏看了的东西,你可以指给他看。一周后,有一个负责Content理赔的顾问来看什么东西要赔。之前,自己要做好一个单子,写好什么东西丢了,坏了。丢了的,最好要有收据,没有的话,原包装盒子也可以。坏了的,他们要把东西拿去。
刷墙,洗地毯,换锁等,是Home Insurance一部分,他们有固定合作公司,这部分你自己不用操心,这些公司会自己跟你联系,安排好时间来工作。花多少钱自己也不用管,他们会向保险公司报账。
理赔的东西,都是Content Insurance部分赔,大部分都是按原来型号赔新的。各种电器,他们也有固定供应商,供应商会把东西直接寄到家里。小伞锁匠 修锁 换锁 装锁调查发现有些东西型号太老了,市场上买不到,供应商会给保险公司建议赔什么相应的东西,保险公司会跟你商量,看你满不满意。小伞锁匠aria locksmith 修锁 换锁 装锁调查发现唯一特殊处理的是Plasma电视机,我们买的时候很贵,但贬值很快,一年后只是原来的1/2价钱。供应商按我们收据上的价钱,给我们赔了个新款的。家具部分,他们没有固定供应商,原则上是能修就修,不能修就买新的。这部分就比较麻烦,首先要找修家具的来拿两个Quote,然后再去商店拿两个同样家具的Quote,保险公司最后会告诉你哪些修,哪些买新的。我们不愿意修,他们就把修的钱给我们,我们自己补差价,全部买了新的。最后,所有的烂东西都不能丢,保险公司会安排搬家公司来把所有的东西搬走。
首饰的理赔就比较麻烦,而且有一千元的限制。小伞锁匠aria locksmith 修锁 换锁 装锁调查发现好在我丢了很少,也有收据,都给赔了。现金的理赔有300元限制,我们丢了好几千人民币和一些其他外币,就赔了300元澳币。
买多少钱的保险才够,各家情况不一样,保险公司的网页上有个估计表,自己填了就知道了
现在再谈一下报警系统吧:一般的家庭型报警器分有线和无线两种
首先,无线和有线的报错率上面是没有直接关系的。如果你选择有线,最好就是在造房子的时候把线排进去。那如果你买的是现房,后来想装,那只能选择无线的。无线的概念其实也就是探头是无线的,主机控制面板还是有线的。 控制面板的线,一条是power线,进插座的。一条则是进电话线的。
探头是根据家里的movement来给主机出信号的,那么家里有宠物的岂不是就不能装了?答案是:可以的。aria locksmith小伞锁匠 修锁 换锁 装锁调查发现因为有种pets friendly的探头,那种探头,在动物活动的时候是不会发出信号的,而在人活动的时候才会发生信号,无线探头的电视属于那种9V的方块电池。一般18个月到2年才更换一次。
澳洲本地集资的做家庭型报警器的大公司主要有三家:
HILLS, NESS, BOSCH。其中NESS是土生土长的澳洲家庭产业,整个公司都是家庭股份制的。HILLS里的分公司或者品牌比较多,有HILLS,DAS, PATCOM(主要做CCTV, B2B一类的产品).BOSCH 大家应该都不陌生,这个公司本来的创始人/公司也是澳洲本土的,但是后来被BOSCH收购了,所以也算澳洲公司把。
如果是新房子,还没造好的那钟,那最好是装有线的。小伞锁匠aria locksmith 修锁 换锁 装锁调查发现因为不需要没1年到2年换电池,当然换电池也不是很难。一节9伏电池就能搞定了。如果是锂电池,可以持续18个月到24个月。如果是一般的芯电池,6个月就要换一次了。至于价格,取决你想要几个探头,什么档次的设备,一般来说一套家用的也就700-1200了
根据澳洲的相关法律规定,安装报警器必须是有执照的电工才行,如果自己安装没事的话还行,如果有事就麻烦了。
如果你自己买了个安装,充其量只能算是一个LOCAL报警器。小伞锁匠aria locksmith 修锁 换锁 装锁调查发现万一那天你想把你的报警器和监控服务连接或者挂钩,那就不行了。要知道,一个本地工作的报警器根本没什么作用,因为邻居也好,路人也好,听到报警器没几个会有反应的。 我家曾经有一次报警器响,当然我在家,过了半小时也没见有人过来问情况,甚至连看的人都么有。万一那天是小偷进来呢,那不是完蛋。
一般很多报警器都是从你家的电话线走。原因就是要通过电话线吧信号传导监控中心,这样万一报警器响,监控中间就可以通过你的电话线收到信号。就连电池没电、panic信号等不用信号方法监控中心都能看的到。
那有人要问了,如果电话线被掐断了怎么办?如果电话线短了,那信号就不能到达监控中心,也就是说就算有人破门进去,我们也不能收到信号。如果想避免这种情况,大家就可以选择GSM系统。这种系统是手机网络传送信号,所以不需要担心信号会被掐断。
GSM和传统电话线报警器还有一个区别就是:通过电话线报警的设备,每过一个周期,比如一天、一周等都会打一个电话来监控中心。监控中心就是通过这种方法来获取你报警器发出的信号的。如果万一有一天周期时间到了,但是信号没传导,监控中心就能知道你的电话线有问题或者报警器坏了等。
但是大家可能不了解,这种方法其实有个弊端:
如果你设置的一周才report一次,那中间的危险期势必就会比较长。如果你设置的是一天report一次,就意味着你每天都要打一个电话来监控中心。一个月下来,电话账单可想而知。
而且如果这种设备一定要有电话线才能安装连接,现在越来越多的家庭都不用电话,所以GSM就成了个很好的选择
GSM的控制板里面有一张SIM卡,就是手机用的SIM卡。这张卡由监控中心提供的,所以每打一次电话来控制中心REPORT都是公司付账单。所以,如果你选择GSM的设备,长期来说还是合算的。
谈谈何为panic botton:
顾名思义就是当有人遇到危险的时候才会按下的一个按钮
如果你在家发现有人入室或你有危险,你就可以按下这个按钮,这个按钮按下之后监控中心里收到的信号是不同的。电脑里面可以看出那个是panic botton,一般这种情况下,中心会直接报警,而不是打电话给你询问情况。虽说这里的警察效率不高,但是如果是有执照的监控中心打电话给他们,还有比较有效的。
Tue
30
Jun
2015
Aluminum storefront doors come in narrow, medium, and wide stile configurations.
The stile refers to the vertical pieces of extruded aluminum into which the lock and some of the hinge mechanisms are installed. The aluminum glass door stiles and rails are usually 1-3/4 inches
thick.
The terms narrow, medium, and wide refer stiles refer to the width of the extrusion.
· Narrow stile is usually 1-3/4 to approximately 2-1/8” inches wide
· Medium stile is usually around 3-1/2 inches wide
· Wide stile is usually about 5 inches wide.
The rails, which are the vertical top, sometimes middle and bottom aluminum extrusions, are available in sizes from four to 10 inches or more for the bottom rail. When this type of door is discussed, the terminology often defaults to narrow stile, even when the stile is wider.
Narrow stile aluminum glass storefront door lock options can be divided into two options: non-business hours pivoting deadlock (deadbolt) and deadlatch lock during business hours. The traffic control deadlatch provides an additional benefit, preventing the wind or stack pressure from opening the door. Some deadlatches have the capability to hold the latch retracted to permit unrestricted access and egress.
Important: Before making any lock hardware changes to an aluminum glass stile door, carefully measure the thickness and width (stiles) or height of the extruded aluminum doorframe. Door stile width and thickness can determine what door locking hardware can and cannot be used and the available area for lock installation.
The glass panel can be in different thickness ranging from approximately 3/16” to one inch. The thicker the glass, the more support is required to keep it in place. As a result, if the stile is too narrow, the backset of the lock may be too deep. Installing a questionable lock can result in contacting the edge of the glass, causing it to break.
It is important to know how the doorframe extrusion components are constructed. For example, Tubelite doors use steel tire-rod (threaded shaft and nuts) construction at the top and bottom of the doors to hold the stiles and rails together. This method of construction permits the doors to be disassembled, resized and assembled in the field. Other manufacturers weld the corners together.
In this article, we will discuss mechanical and electromechanical lever-equipped pushbutton locks that are designed to be narrow stile glass aluminum door retrofit outside trim. They accommodate the Adams Rite-style deadlocks and deadlatches. They have a narrow and longer footprint to accommodate the width of the stile and to cover most existing door prep.
Lock manufacturers who offer narrow stile glass aluminum, lever handle door retrofit outside trim and complete locks include Adams Rite, Alarm Lock, Codelocks, Kaba Access & Data Systems Americas and LockeyUSA. They are available as mechanical and electromechanical pushbutton versions.
Most of the above manufacturers’ products are designed to retrofit onto a narrow stile glass aluminum door that is configured for an Adams Rite or similar style ANSI mortise deadlatch. Some are designed to accommodate the deadlock. The retrofit outside trim version is designed to take the place of the existing outside trim. The retrofit outside trim measures more than 10 inches to cover any pre-existing door prep
Tue
30
Jun
2015
Employee identification badges have been around for well over 100 years. Ford Motor Company’s early ID badges had the employee number and the name of the facility stamped into the metal badge. Company rules required employees to wear the badge visibly, outside of their clothing, at all times. In the mid-1910s, Ford began using German Silver (Sterling Silver) for their badges.
These early employee identification badges were an easy way to determine if an employee was where he belonged or if an employee was not where he was supposed to be. There was minimal need for keys as many companies were on three shifts or a few “trusted” employees received access to keys to lock and unlock doors. Usually, the person in the guard shack would provide access control.
Over the years, employee identification badges have become more popular and useful, with photos providing a more precise form of identification. Some badges not only provided identification, but also could be used to make purchases and gain access using the badge as a credential. Access capable employee identification badges (access badges) provide identity documentation and a credential, which is a way to identify a person to a system for the purpose of authentication.
In the late 1960s, magnetic stripe (tape) magnetic qualities were modified to store data. Through trial and error, the stripe was eventually bonded onto a plastic card base. The magnetic stripe or Magstripe card provides the ability to store data on an inexpensive, easily transportable product. The first Magstripe card for identification was invented by Forrest Parry at IBM for the U.S. Government.
Next, different international, governmental and private standards came into place for the physical properties including size, location of Magstripe, magnetic characteristics and data formats and positioning. Magnetic stripe cards were developed into bankcards, employee identification cards, etc.
A plus for the new identification card was the opposite side of the plastic base could be printed and/or embossed with logos, photos, company information and employee information. Companies could have the time clock operating in conjunction with access cards to audit employees and determine payroll.
Unfortunately, a limited amount of information can be contained on a Magstripe card. For access control applications, information could be encoded at the producer’s location and/or the end user’s location. The magnetic stripe would keep the information relatively protected.
Magstripe cards are read using hardwired swipe card (insertion) readers. A downside of the Magstripe cards for access control was that the strip would prematurely wear out. In instances where the card was used multiple times a day, a card could need to be replaced as often as every three months.
The demise of the Magstripe card is rapidly approaching as the ease of cloning and lack of security has become unmanageable.
Newer technology includes the later incarnations of the low frequency 125 KHz Proximity (Prox) cards and the 13.56 MHz smart cards. Proximity card technology has an Integrated Circuit (IC) connected to a copper wire coil. The coil provides an antenna to receive and transmit the data. The Proximity card just needs to be near the reader (within inches) for a moment to have the encoded data (code) read. Most readers emanate a beep notifying the cardholder it has been read. Unlike Magstripe, Wiegand Keycard and barium ferrite cards, direct contact or even line of sight is not required for a Proximity card to be read.
Proximity cards are coded to a pre-programmed facility code and serial number. Contained within the Proximity card IC chip is the encoded data. This data is fixed; no changes can be made once they have been created.
The industry standard Proximity format is the 26-bit Wiegand protocol. It is an open format, which is recognized by most access control hardware. The 26 bits uses a facility (site) code and card numbers. The 26-bit Wiegand facility code is bits 2-9. The facility code remains the same for the entire facility. The code (card) number is bits 10-25. Bit-1 is even parity and bit-26 is odd parity. Different formats and manufacturers have a similar structure and parity bits to check for errors.
There can be up to 65,535 card/fob ID numbers in a “standard” 26-bit Wiegand Format, from one to 65,535, using all 16 card number field bits, per facility code.
In today’s world, part of the problem of having a sufficient number of card numbers is in an average education facility such as a university, college or hospital is turnover rate. In an average higher education facility that has campus wide access control, approximately ¼ to 1/3 of the total card holders annually drop out, graduate, retire or move on from temporary positions. In addition, some think badges are disposable and lose them monthly. It is never a good idea to reuse card numbers unless administration has all of the cards that have been given out.
In addition to the 26-bit format, additional formats include the 34-bit and 37-bit. They are also available in dealer proprietary formats. Before purchasing a Proximity card-based access control cards and readers, make sure the equipment chosen provides the desired level of security.
Most access control Proximity cards and badges are passive, requiring radio frequency signals from the reader to transmit through the coil, powering the IC onboard power storage. Once powered, the encoded data (binary code) is transmitted to the reader and converted to be read by the controller to determine if access is granted or denied. If access is not granted, no action is taken. If access is granted, the locking mechanism and related components are unlocked and the cardholder can gain entry. Most new readers continue to incorporate Wiegand upstream data so they will always be backwards compatible with older technology access control systems.
Most Proximity cards are the clamshell style with a top and bottom plastic cover sandwiching the coil and the integrated circuit. These cards are available with the card horizontal (card style) or vertical (ID badge). Other styles include the fob, tag and the Prox horizontal card with Magstripe. Proximity cards can also have a Barcode (UPC).
There are advantages with the Proximity card using multiple technologies. For example, a Proximity card can also have a Magstripe and/or bar code. This provides the ability for a school to provide either debit or credit transactions for purchasing using one card that also identifies the person.
There are problems with Proximity card technology. There are a limited number of facility codes since the binary system is either odd or even. This means that the number of Proximity card systems with large amount (100,000 or 1 million) of card numbers is limited. Different manufacturers using similar facility codes and card numbers result in the possibility of duplication. A greater concern is many Proximity card technologies can be cloned.
There are variations of the Proximity card technology. For example, HID Indala 125 kHz Proximity Readers have FlexSecur® technology. This provides an additional level of reader verification processing. MAXSecure from Farpointe Data integrates a high-security code (handshake) between the Proximity credential and the reader. MAXSecure is designed for applications where card numbers have been repeatedly used due to excessive turnover or time. The high security code equipped Proximity cards screens out unauthorized credentials. For information on technologies supported, contact Farpointe Data.
Around the early 2000s, the 13.56 MHz smart card was developed for access control applications to provide a higher level of security. The smart card has an embedded, secure integrated circuit (microcontroller) or equivalent intelligence with memory. Credit Card companies are converting to cards with Europay MasterCard Visa (EMV) chips. EMV technology will not prevent data breaches, but they will make it much harder for criminals to profit at this time. According to a resource, France has cut credit card fraud 80 percent since 1992, when they introduced the EMV technology. Employee identification badges for many government agencies now require the use of smart cards.
There are contact and contactless smart cards. Contact smart cards have the contact chip above the microcontroller on one side of the card. The gold or silver color contact chip contacts the mechanism within the contact reader.
The contactless smart card is used for commercial access control applications where the time required to insert the card into a reader, have it read and removed adds way too much “person time” for controlled entry doors especially on a large scale.
Contactless smart cards have a coil assembly connected to the microcontroller. These cards make use of radio frequency between card and reader, eliminating the need to physically insert the card. For access control requiring a higher level of secure card access, the contactless smart card can verify that the reader is authentic and can prove its own authenticity to the reader before starting a secure transaction.
Proximity cards use a coil as an antenna and an integrated circuit. However, Proximity cards have no memory. The embedded memory-equipped microcontroller gives smart cards the unique ability for encryption and mutual authentication, store large amounts of data and interact intelligently with the reader. The smart (access) card is read by a contactless radio frequency reader, as is a Proximity card using the same access control application information. Like the Proximity card, the smart card produces a Wiegand protocol output.
For access control purposes, a smart card is available in card, fob and tag configurations, the same as the Proximity card. The microcontroller in the smart card can implement a personal firewall, releasing only mandatory information when required. This gives the smart cards unique capabilities such as support for biometric authentication and information privacy if the organization issuing the cards, readers and systems designs it into the application.
There are different smart cards. Some are read/write and others are read only. Proprietary smart cards include the Mifare and DESfire. There are the different HID iClass smart cards. Because of the variations, not all smart card readers and multiple credential readers will read all of the different card formats. To meet this end, multimode cards have multiple microcontrollers to function with different methods of communications. Before setting up an access control system using a specific smart card technology, do your research to ensure your customer’s needs are met.
As different smart card and additional technologies develop and improve, the migration from one technology to another must be available for seamless operation for several reasons. The development and administration costs for a new identity access card system can be expensive. Offering multiple technology credential readers that read both Proximity cards and smart cards helps to create a timeframe to convert making it fiscally practical when the process is started early on in the development of the smartcard system.
Hybrid card readers can include a Magstripe or a Wiegand keycard reader in addition to the Proximity card reader and/or smart card reader. This eases technology migration while some are still using their same access badges. Make sure the reader is compatible with the smart card’s technology. Once the new readers and software have been incorporated, the access cards can be distributed by groups introduced by level or required security.
o increase security, HID is introducing bioClass readers that provide multi-factor authentication utilizing smart card technology combined with biometric template verification, and/or a PIN. During verification, the LCD graphical display will assist the user with instructions about finger placement on the biometric sensor. The fingerprint template is collected at the reader and immediately transferred to the card. During this enrollment process, the fingerprint template is stored only on the card. The template is never transmitted to an external host. The location of the finger pad is compliant with ADA standards.
The intelligent use of access cards that authenticate any individual who has access privileges is critical to maintaining a high level of security. To maintain such levels, companies must require strong authentication requirements. Depending upon the level of security, multiple credentials can include microcontroller, biometric and keypad.
Mon
06
Apr
2015
Wed
01
Apr
2015
有了汽车智能钥匙,我们只需将钥匙放在口袋里,靠近汽车一定距离时,车门锁便会自动打开;进入车内,只需按动启动按钮(或旋钮),汽车就点火启动了,使用起来十分方便。提醒各位车主朋友,平常使用汽车智能钥匙需要注意“五不要”,以免遭成损坏。一、不要乱抛乱扔
专家强调,多数智能钥匙的内部线路抗冲击力较弱,遇到剧烈碰撞时容易损坏。此外,智能车钥匙进水后会烧坏内部的线路,也会造成遥控失灵。另外还要注意不要将智能钥匙放在挡风玻璃下或其他容易受到阳光直接暴晒的高温环境中。
二、不将备用钥匙放车内
智能钥匙一旦保管不善丢失,就会带来许多麻烦,而且重新匹配的成本较高。专家提示,备用钥匙不要放在车内或和智能钥匙放在一起。
对于智能感应钥匙,在换钥匙时需要修改电脑参数,重新匹配成套的新钥匙,车主需要提供车辆及身份等证明,还要厂家出具车型的相应参数或密码,更换后丢失的钥匙就不能再启动发动机。另一种解决方法是更换全车车锁,这种方法更为保险,但是维修费用成本和维修时间成本较高。
三、不要接触金属物品
很多车主习惯将智能钥匙与其他钥匙或饰品放在一起,殊不知与金属物品相接触或被金属物品所覆盖,智能钥匙有可能失灵。同时在颠簸中,其他物品也有可能造成智能钥匙损坏。
四、不要和电子装置放在一起
专家介绍,一般情况下,智能钥匙的原装电池可以使用两年左右,但如果智能钥匙受到严重电磁干扰,也会失灵。“一些环境中,电磁干扰比较强烈,智能钥匙与车辆间的无线通讯,因受到电磁波的影响而暂时失灵。”专家说,“如果将智能钥匙与手机长期放在一起,里面的芯片就容易受到手机频率的干扰,也会暂时失灵。”
专家提醒,由于智能钥匙使用低强度无线电波,所以平时不要和电子产品、设备放在一起,收音机、电视机、电脑、微波炉等都属于智能钥匙的“克星”。电磁波不仅耗电,还会影响智能钥匙的芯片,最终会导致智能钥匙失灵。
五、切勿用错电池
给智能车钥匙换电池要慎重,一旦出现差错,钥匙中的电路板就会烧坏。专家建议,车主要尽量到专业店更换电池。如果贪图便宜,造成钥匙损坏就得不偿失了。
Wed
01
Apr
2015
sydney aria locksmiths 0402741928(小伞锁匠)是一家正规注册持牌开锁公司,服务网覆盖整个悉尼市,365天24小时为悉尼市民提供全天候全方位地服务。专业开启维修各种防盗门、文件柜、密码箱、汽车、金库门、 窗户锁,信箱锁等,并可配换相关的锁体、锁芯、钥匙。拥有一批高素质的锁匠队伍。全体员工严格遵守国家法律、法规,对客户语言文明、服务周到、严格持行公司的价格标准。
开锁,换锁,换锁芯,修锁, 配各种钥匙......
项目一:技术开启各种门锁,车锁。
项目二:安装各种高、中、低档正门锁,电子锁, 卧室锁.
项目三:技术开启各种高、中、低档汽车锁,配芯片钥匙,遥控钥匙。
小伞锁匠专业从事无损技术性开锁、修锁、装锁、换锁、配匙及经销各种各样的锁;开修各种门锁、文件柜、各系列进汽车、异型锁、密码锁、磁力锁、电子锁, 多年以来专业从事锁具的装配与维修,深受广大客户的信赖及认可。 服务悉尼,方便在最短的时间,以最快的速度,及时提供快捷便民服务。本着强硬的技术服务到位,始为顾客之需求,终为顾客满意的服务理念,全心竭力为新老客户提供急开锁、修锁、装锁等服务。
服务地区:
Ashfield |
Burwood |
Epping |
Kensington |
Ryde |
Auburn |
Campsie |
Flemington |
Marsfield |
Strathfield |
Bankstown |
Carlingford |
Gordon |
Merrylands |
Sydney City |
Berala |
Chatswood |
Guildford |
Parramatta |
Wolli Creek |
Blacktown |
Dundas Eastwood |
Hurstville |
Homebush Rhodes |
Lidcombe Zetland |
Fri
07
Nov
2014
For those of us involved in the security industry, the best way to predict the future is to identify emerging trends. For most of us we do what is necessary to keep up with the competition and respond to our client’s requests. For those with the pioneering spirit, the spark of inspiration and the desire to succeed fosters entrepreneurial ventures and new solutions.
A little knowledge of the history of our industry is helpful, if for no other reason than to help us avoid past mistakes. A trend is defined by a combination of market demand, available technologies and solutions, and effective delivery solution.
I entered into the access control/security industry in 1976 in the design/manufacturing sector, broadened out into sales, then service and marketing, partially to satisfy my curiosity but largely to meet the demands of the job and pay the mortgage. Back then the jobsite was the classroom and installation instructions were the textbooks. As a long-term contributor to The Locksmith Ledger while also being actively involved in various capacities within the security industry, I have a sort of global perspective.
When we decided to an article on emerging trends, I sent out the question: “What do you see as the emerging trends in access control?” Here is my list of emerging trends, followed by responses from some industry leaders.
Convergence of EAC from passive door control towards pro-active security functionality. The role of access control is expanding to functions which begin before the individual arrives at the door and involves more than the decision of whether or not to grant access.
Increased implementation in markets/applications: corporate, transportation, retail, education and transportation.
Improved multi-factor authentication: better technology.
Transitions in credentials; (prox, multi-tech, multi-application, smartcards, smartkeys, smartphones, biometrics). Early credentials were encoded by imbedded magnets, wires, and magnetic stripes. Embedded wires and magnetic stripes persist, but with the onslaught of cybercrime, we may be moving into a new era.
Integrating solutions: standalones, reader/electric locking device
Converging infrastructures: hard-wired, wi-fi, z-wave, RS-485 infrastructures.The various system components now typically bridge across protocols on very low power to achieve seamless interfacing.
Combining EAC with video analytics. Cameras have morphed into imaging devices processed by algorithms to open up functionalities which barely made wish lists before reaching fruition.
Running applications and devices over non-proprietary infrastructure, lowering installation costs but requiring enhance encryption. Earlier on, system elements highly proprietary and manufacturers were territorial about their technology. One company’s credential would work with only a certain reader. Management software came preinstalled on dedicated hardware. Then the industry shifted to open architecture using brand name PCs and network protocols. This brought down the cost of EAC drastically and dramatically increased potential. Fast forward to this era and companies promote their products by promising interoperability and open platform/ open architecture.
Tightening of system pricing as system features become more subject to codes. Building Codes are increasingly addressing requirements for systems and the qualifications for those installing them. The more they do, the fewer opportunities, as system designs will become boilerplate; bidding will become filling in the blanks with the lowest number, and only larger installers will be able to afford the training licensing and insurance requirements.
Zwipe: Dual-Factor Authentication
Zwipe biometric cards can provide the enhanced security benefits of two-factor biometric authentication without any changes to an existing access control system software or readers.
"All of the recent news reports about the mishandling and hacking of card information has made both consumers and institutions more leery of using a card only to verify the card holder. There is an increasing demand for an affordable way to use biometrics to authenticate the card holder without having to replace already-installed card readers and equipment. By placing the biometric reader on the contactless card itself and using the legacy smart card reader to read it, a biometric card meets both objectives,” commented Zwipe CEO Kim Humborstad.
Privacy has become a huge issue, along with concerns that biometric data could be stored and distributed. “ Fingerprint data is captured by the on-card fingerprint scanner and is thereafter encrypted and stored only inside the card. No exchange of data is conducted with external systems. This provides secure template management since the fingerprint never leaves the card. It also eliminates user concerns with privacy issues. The card is unique to the user and only the authorized card holder can activate card communication with the reader," Humborstad said.
New features have been added on customer input gathered since the ISC West trade show, noted Robert M. Fee, Zwipe’s director of sales. These include:
1. Support any existing or new, HF or LF card platform including: iClass, 125kHz Prox, Mifare Classic, DESFire EV1, Legic prime and Legic advant.
“Sixty percent to 70% of the existing access control market is using 125kHz proximity RF technology from companies such as HID Global, Allegion, Farpointe Data, SecuraKey, and AWID. The new Zwipe Access will be 100% compatible with these legacy Prox systems,” Fee said. “Working with proximity readers now lets more end-user use biometrics on high security openings, such as a hospital pharmacy, IT server room or special research lab, without having to upgrade their proximity readers for biometric readers.”
2. Replaceable battery: Standard coin cell battery can be easily replaced by the user.
3. New fingerprint sensor increasing quality of fingerprint enrollment and authentication.
4. Clamshell design allowing use of a lanyard for easier display.
5 Smooth backside for personalization of the card via a pressure sensitive label (employee name, photo, department, etc.)
6. De-enrollment of an existing fingerprint allows the card to be re-issued to a new employee (controlled by a license for security purposes)
ADI: Integrated Technologies
ADI Distribution is a largest low voltage distributors, offering products for security, life safety, fire, communications, networking home automation, tools and video.
Michael Flink President, ADI Americas offers his opinion to our trends question with:
Web-based access control solutions continue to be popular. Web-based access control allows dealers to utilize existing network infrastructure to save time and labor on the installation and the web interface eliminates the need for a dedicated PC, unless there are higher security requirements.
Products like Honeywell’s NetAXS-123 have been well received as they offer the scalability to easily and affordably expand the system one door at a time based on the customer needs.
The integration of video surveillance and access control has become more mainstream with the adoption of IP. Security professionals are able to provide a comprehensive security system for video surveillance and access control that allows users to get more out of one interface. More VMS systems, like Exacq, ONSSI and Milestone, are offering seamless integration of video with access control products.
Technology manufacturers have partnered up and invested a lot of time and resources to make sure the systems integrate properly, and the shared application programming interface makes it easy to write simple code for custom integration, which in most instances the vendors have already taken care of.
We are also seeing the integration of video surveillance and access control increasing more now in the mid-low end platforms, where in the past it was primarily in larger level installations. As technology becomes more economical, dealers are able to offer integrated systems to organizations of all sizes with different needs and requirements.
Wireless access control solutions are gaining more popularity. Using wireless networks, these technologies offer a less complex, easier to install and cost effective alternative to traditional wired access control systems. With the improvements in wireless technology and no need to pull wires to install these products, dealers are adding these solutions to their offering. Wireless access control offers the perfect solution for outside gated areas, plenum environments and retrofit installations.
Access control solutions that can be managed from a smartphone or tablet app have widely accepted by users. Users like to be able to see and control their system from their smartphone, and instant information delivered to the end user’s phone offers a great safety and security feature.
The use of smartphone interfaces and Near Field Communications for access control credentials will become an emerging trend across the market. Manufacturers are working on new technologies that offer these capabilities, and we will soon see keypads, cards and readers, and biometric solutions being replaced by products that communicate through smartphones. Users will embrace smartphone access control as it offers security and convenience.”
Allegion: Wireless
Rick White, Vice President, Sales and Field Marketing, Americas at Allegion US. Provided his take on trends:
I think the greatest opportunity is expanding electronic access control beyond the standard applications of the perimeter. For instance, consider the president’s office, the data room, the utilities room, labs and other areas.
Developed specifically for facilities that want to upgrade from mechanical locks and keys to electronic credentials for improved security and efficiency, new standalone wireless locks are ideal for interior office doors, common area doors and sensitive storage spaces at a fraction of the cost of traditional EAC. Programming is easy. All the administrator needs is a lock and a download a free mobile app.
Since 90 percent of the openings in the market are still purely mechanically managed, just think how easy it would be to add two to four more doors per job by promoting electronic solutions. That could generate between a 15-20 percent increase in revenue without installing more projects than before, without finding and winning any more customers and without driving to any additional sites.”
Clark Security: Access Control For Small Businesses
Clark Security (a division of Anixter) is a leading wholesale distributor of security products: door hardware, key systems, CCTV, and electronic access control.
Joe Rigby, National EAC Strategy Manager for Clark Security and has been with Clark since 1991.Here is his response.
“Electronic access control is the fastest growing form of electronic security—both in innovation and demand. CLARK supports many brands on the leading edge of EAC that are creating innovative, robust EAC systems and technology that are more intelligent and less complex to install and maintain. They are also less expensive.
This is good news for the general public. Thanks in large part to smart phones bringing awareness to security technology trends like biometric locks, people know that more secure schools, malls, hospitals, offices, and homes are literally within reach. The driving force behind this surge in security innovation is a tech-savvy and too often grieving public that expects and demands the security industry to provide smarter technology with more control—innovations that will curb the trend of public massacres that has escalated over the past decade.
This is good news for small business. In the past, large enterprises have been the ones who could afford electronic access control systems. As the technology improves, becoming more robust and less expensive, smaller businesses can afford EAC.
This is good news for the security professional.
As demand for electronic is shifting from large enterprises to the general public and small- to mid-size business, in the electronic industry overall the national average number of doors for an electronic system is also shifting from large office buildings with many doors to smaller buildings with 7 to 10 doors.
EAC systems are getting smaller to fit the demands of the smaller business owner. This shift opens up electronic access control business: installation work that once belonged primarily to integrators is now attainable to dealers who service small-to mid- business in retail, smaller office buildings, and the hospitality industry.
CLARKwill continue to partner with our suppliers and security professionals to meet the demands of the market. This remains a mix of door hardware, key systems, CCTV, and, in rising numbers, electronic access control products and solutions. And we support these solutions with the technical expertise and security education to help locksmiths secure their communities and facilities, as we have for over 60 years.
Cansec: Fingerprint Readers Go Mainstream
Cansec is one of the largest and best respected independent manufacturers of access control. Their objective is to make installation and operation of their systems as streamlined as possible. Here is our response from Cansec President Fred Dawber:
“One of the largest trends I am seeing is the use of fingerprint verification readers - FINALLY! No one has ever questioned the huge security benefit that biometric identification has over PINs and cards. You can disclose you PIN and loan your card but you cannot loan your fingerprint or other unique biometric attribute.
Fingerprint verification readers have been around for at least 20 years in one form or another. So why are they not in broad general use today in the commercial access control market? There are four major reasons;
1. They were too expensive
2.Their performance was unacceptable
3.They were not designed to play nice with standard access control panels
4.Template management was problematic
This is finally changing. As more manufacturers enter the market, competition is driving the cost of these products down.
The sensors used in fingerprint readers keep getting better and, perhaps more importantly, the algorithms have become very sophisticated. In addition, the raw horsepower of the embedded processors used in these devices allows these algorithms to run at incredible speed.
The net result of these advances is that these devices have become far more "forgiving" than they have ever beenThey will work reliably for the average commercial user, who is generally in a hurry and cannot be bothered with having to interact with these devices with the discipline which was historically required.
To facilitate upgrading from conventional prox readers to fingerprint readers, they are being made to fully emulate a prox reader including power requirements and support for LEDs and audible beepers. This literally allows an upgrade from prox to fingerprint to be performed in five minutes. No changes to wiring. No changes to the installed access control panels. No changes to the host access control software.
Lastly, proximity access cards such as iClass and Mifare which have secure read/write capability are now becoming widely used and cost effective. This allows each user to carry their fingerprint template with them on their card rather than having it stored in every fingerprint reader they will be using.
Sun
12
Oct
2014
插芯门锁
简而言之,插芯门锁即锁体插嵌安装在门挺中,其执手覆板组装在门挺表面上的锁。
插芯门锁的主要零件及可选用的材质
插芯门锁的工作原理
插芯门锁的工作原理主要体现在斜舌和主舌的运动过程。
插芯门锁的分类
按使用场合可将插芯门锁分为户门锁(外门锁)和户内锁(通道锁)。前者是一个家庭的大门,是家里家外的分水岭,着重防护性、坚固性和防破坏性,,所以户门锁又称为保险锁或防盗锁;后者只是起着门的拉手和撞珠的作用,这种锁没有保险功能,适用于厨房、过厅、客厅、餐厅及儿童间的门锁,着重于装饰性。
标准插芯门锁以外派生的其他插芯门锁:
锁体上的重要尺寸
锁体上的孔
锁体上所有的孔都有它存在的理由。方孔柱左右的孔用于把手的对穿螺丝,锁芯左右(通常为38mm)的孔用于安装螺丝,下方的孔用于安装锁芯保护器。另外在有剩余的情况下可能会有一些预留孔,因为各国情况不同,为了出口方便会采取这种方法。
主舌的防锯装置
通常在主舌内加一到两根高强度的钢,也可以在圆柱形主舌外加防锯套。
附加知识点:从目前锁具市场的情况看,门锁市场在相当长的时间里,仍将以机械锁为主,而机械锁主要有插芯门锁和球形门锁。插芯门锁比球形门锁更具有发展潜力,原因是:从使用情况看,插芯门锁比球形门锁要优越得多,一是它的防盗性能比球形门锁强,具备双锁头,双锁舌(方舌、斜舌或圆柱锁舌);二是适用范围广泛,既有双头双舌、双头三舌,还有3把或5把一起联锁,具备了内保外的功能。还有一点,插芯门锁也适合残疾人士使用,遇有火灾易于开启,国外已普遍使用插芯门锁
Sun
12
Oct
2014
The electric strike has been a major player in the electronic locking hardware field for many years and, with correct specification in the right application, it remains one of the mainstays of electronic locking today.
Applications can be found in all areas of life from single door to large PC-based systems covering multiple doors and sites.
All strikes basically work on the principle of electronically controlling the temporary free movement of the jaw (striker) allowing for door opening without manual retraction of the latchbolt.
Dependant on model (mortice or rim mount) electric strikes work in conjunction with the majority of popular mortice or rim night latches. Ideally, the latch should have a dead-locking facility whereby the latch bolt cannot be forced back into its case because of the action of the snib resting against the electric strike forend. This facility offers extra protection when a strike is fitted to an outward opening door.
This depends on a number of factors. What level of security is needed? What type of door material is the strike to be fitted to? Single or double door? Is monitoring of the strike required? What power supply unit is to be used in the system? Is the system AC or DC? What else is running off the PSU?
There are three basic categories.
Light: normally with no quoted holding force or life. Usually AC and used for low cost door entry systems.
Medium: Holding force of at least 1,000lb with guarantees of two or three years.
High: Holding force of at least 3,000lb with guarantees of up to five years. Some are available with UL
approval.
Door material - internal or external, single or double doors.
Electric strikes can only be used on single action inward OR outward opening doors. For double action swing-through doors other locking solutions like solenoid bolts, magnetic shear locks or double action electric latches are available. Nowadays there are strikes suitable for nearly all door styles and materials, the most popular being timber and aluminium followed by steel, and occasionally, uPVC.
Potentially, uPVC causes the most problems because of the narrow and often complicated section containing steel re-enforcing. Another problem is the fitting of a suitable lockcase into the narrow uPVC framing to operate with the strike. If the door contains a multi-point lock it is likely to be impossible to fit an electric strike.
If the door contains, or can be fitted with a latch, the best option could be to fit a narrow style sashlock and operate with a sashlock strike either in a UK or DIN faceplate format.
Whilst a sashlock can improve the level of security in any door when the deadlock is thrown, care should be taken to ensure that the bolt is removed prior to attempting the operation of the strike.
The first quantity usage of strikes was in the United States in aluminium doors and frames. This in turn led to an ANSI (American National Standards Institute) specification being produced. The ANSI short faceplate strike (flat or radius faceplate for single or double doors) became the standard for aluminium, whilst a further development was the introduction of a longer faceplated variant which made the ANSI style strike suitable for use in timber door applications.
With the introduction of centre-hung aluminium doors in a 4 inch (101.4mm) framing section, the need became apparent for lead in or extension lips to allow the latch free entry into the jaw of the strike without interference from the frame. Originally a mix and match of the long and short faceplate variants covered steel doors, whilst products designed specifically for timber and steel doors offering longer shallower and narrower bodies are now available.
Watch out for door gaps. The most commonly sold strikes in the UK operate successfully with no more than 1/8 inch (3mm) gap between the frame and door leaf.
Depending on model, most manufacturers produce strikes with or without a monitoring facility. This function relays back the state of the strike via single point monitoring of the latch in the jaw of the strike or by dual monitoring of both the latch and solenoid operation. For door state monitoring, consideration should be given to using a separate reed switch on the door/frame.
Fail Open (Power to Lock) or Fail Secure (Power to Open) are features of the electric strike that will be site dependant. For example, if the strikes are tied into the fire alarm system it is likely that they will be required to Fail Open (Fail Unlocked) once power to the strike is removed. Under other circumstances the strike may be required to fail in the locked position requiring the use of a Fail Secure (Power to Open) strike.
Where security is involved you cannot always expect a low cost AC strike to offer the same level of security that can be achieved by using a more expensive medium/high duty strike. Pick a product that is fit for the purpose. Short-term savings can work out very expensive. Most of the low cost door entry systems operate on AC rather than DC. Alternating Current produces the familiar buzzing sound which is not heard with DC systems, and AC strikes are only available as Fail Secure (Power to Open). More sophisticated systems operate on DC allowing for continuous silent Fail Open (Power to Lock) or Fail Secure (Power to Open) operation.
One of the most important areas for consideration when using any electric locking device is the PSU. Correct specification will help ensure fault-free running and ensures the PSU puts out the correct voltage required to run the electric strike within the tolerances stated. Remember to take into account any other products running off the same PSU. Most access control systems in the Australia run off 12v DC with the other common type being 24v DC.
Normally 24v DC runs at half the current draw of 12v DC which may be of assistance when working out what PSU to use. Most of the Australia fire alarm industry runs on 24v DC. If possible, ensure it is a regulated PSU whilst consideration should also be given to the gauge of wire used to supply the product. Long and thin wire runs could lead to voltage drop at the product and further problems.
These have included higher holding forces; rapid Power to Lock/Power to Open and vice versa changeover; more shallow overall depth reducing frame cut-outs and possible weakness; rebated face plates for timber doors; low current consumption; low heat generating solenoids; cast one-piece bodies; supplying templates to assist fitting; weather resistant models and extended warranties. Three companies now offer UL rating, with one offering both UL and CE approval.
An area of concern is fitting electric strikes to outward opening doors. Potentially doors fitted with standard ANSI strikes are left vulnerable because of the open lead-in extension lip, often unavoidable on aluminium door applications.
This led to the development of lipless and wrap-around strikes now available from a number of manufacturers which, when used in conjunction with an integral door or face fix T bar, offer the highest levels of security attainable with an electric strike.
Electric strikes are not the all-encompassing solution for all problems - like all things in life the right product still needs to be correctly specified and installed in the right place, and all reputable manufacturers will give guidance to help the installer make the right choice.
Sun
12
Oct
2014
铸造
定义:将金属熔炼成符合一定要求的液体并浇进铸型里,经冷却凝固、清整处理后得到有预定形状、尺寸和性能的铸件(零件或毛坯)的工艺过程叫铸造。
特点:
种类:
铸件的缺陷:
缩孔和缩松:铸件在凝固过程中,由于合金的液态收缩和凝固收缩,往往在铸件最后凝固的部位出现空洞,容积大而集中的孔洞为缩孔;细小而分散的孔洞称为缩松。在铸件中存在任何形态的缩孔和缩松,都会由于它们减小受力的有效面积,以及在缩孔和缩松产生应力集中现象,而使铸件的力学性能显著降低。由于缩孔和缩松的存在,还降低铸件的气密性和物理化学性能。因此,缩孔和缩松是铸件的重要缺陷之一,必须设法防止。
附加知识点:铸造是人类掌握较早的一种金属热加工工艺,已有约6000年的历史。公元前3200年,美索不达米亚出现铜青蛙铸件。公元前13~前10世纪之间,中国已进入青铜铸件的全盛时期,工艺上已达到相当高的水平,如商代的重875千克的司母戊方鼎、战国的曾侯乙尊盘和西汉的透光镜等都是古代铸造的代表产品。早期的铸造受陶器的影响较大,铸件大多为农业生产、宗教、生活等方面的工具或用具,艺术色彩较浓。公元前513年,中国铸出了世界上最早见于文字记载的铸铁件——晋国铸鼎(约270千克重)。公元8世纪前后,欧洲开始生产铸铁件。18世纪的工业革命后,铸件进入为大工业服务的新时期。进入20世纪,铸造的发展速度很快,先后开发出球墨铸铁,可锻铸铁,超低碳不锈钢以及铝铜、铝硅、铝镁合金,钛基、镍基合金等铸造金属材料,并发明了对灰铸铁进行孕育处理的新工艺。50年代以后,出现了湿砂高压造型,化学硬化砂造型和造芯、负压造型以及其他特种铸造、抛丸清理等新工艺。
压力铸造
定义:铸造的一种,即将溶融合金在高压,高速条件下充型并在高压下冷却凝固成型的一种精密铸造方法,简称压铸,其最终产品是压铸件。
特性:
优点:
缺点:
粉末冶金
定义:粉末冶金是制取金属或用金属粉末(或金属粉末与非金属粉末的混合物)作为原料,经过成形和烧结,制造金属材料、复合以及各种类型制品的工艺技术。粉末冶金法与生产陶瓷有相似的地方,因此,一系列粉末冶金新技术也可用于陶瓷材料的制备。由于粉末冶金技术的优点,它已成为解决新材料问题的钥匙,在新材料的发展中起着举足轻重的作用。我们常见的机加工刀具,很多就是粉末冶金技术制造的。
特点:
轧制
将金属坯料通过一对旋转轧辊的间隙(各种形状),因受轧辊的压缩使材料截面减小,长度增加的压力加工方法,这是生产钢材最常用的生产方式,主要用来生产型材、板材、管材。分冷轧、热轧。
挤压
是将金属放在密闭的挤压腔内,一端施加压力,使金属从规定的模孔中挤出而得到有同形状和尺寸的成品的加工方法,多用于生产有色金属材料。
拉拨
是将已经轧制的金属坯料(型、管、制品等)通过模孔拉拨成截面减小长度增加的加工方法大多用作冷加工。
自由锻和模锻
附加知识点:自由锻和模锻是锻造下设的两种分类。利用锻压机械对金属坯料施加压力,使其产生塑性变形以获得具有一定机械性能、一定形状和尺寸锻件的加工方法叫锻造。通过锻造能消除金属的铸态疏松,焊合孔洞,锻件的机械性能一般优于同样材料的铸件。机械中负载高、工作条件严峻的重要零件,除形状较简单的可用轧制的板材、型材或焊接件外,多采用锻件。
锻造按变形温度又可分为热锻(加工温度高于坯料金属的再结晶温度)、温锻(低于再结晶温度)和冷锻(常温)。锻造用料主要是各种成分的碳素钢和合金钢,其次是铝、镁、钛、铜等及其合金。材料的原始状态有棒料、铸锭、金属粉末和液态金属等。金属在变形前的横断面积与变形后的模断面积之比称为锻造比。正确地选择锻造比对提高产品质量、降低成本有很大关系。
冲压
定义:冲压是在常温下靠压力机和模具对板材、带材、管材和型材等施加外力,使之产生塑性变形或分离,从而获得所需形状和尺寸的工件(冲压件)的成形加工方法,又名板金冲压加工(Sheet
Metal Stamping)。冲压和锻造同属塑性加工(或称压力加工),合称锻压。冲压的坯料主要是热轧和冷轧的钢板和钢带。
分类: 冲压主要是按工艺分类,可分为:
在实际生产中,常常是多种工序综合应用于一个工件。冲裁、弯曲、剪切、拉深、胀形、旋压、矫正是几种主要的冲压工艺。
用途:全世界的钢材中,有60~70%是板材,其中大部分是经过冲压制成成品。汽车的车身、底盘、油箱、散热器片,锅炉的汽包、容器的壳体、电机、电器的铁芯硅钢片等都是冲压加工的。仪器仪表、家用电器、自行车、办公机械、生活器皿等产品中,也有大量冲压件。锁具零件80%~90%为冲压件,常用的冷冲压模具的分类:
按冲压内容分为以下三类
第一类
冲裁模:从条料、带料或半成品上使材料沿规定轮廓产生分离的模具。落料、冲孔、切边、切断、剖切等工序使用的摸具都属于冲裁模。
第二类 弯曲模:使零件产生弯曲、折弯、圈管等。
第三类 拉伸模:对板材进行各种形状的变形,如球形手柄、各种筒状件等。
按冲压工序的组合程度分为以下三种
第一种 简单模:压力机在一次冲压行程中只能完成单一冲压工序的模具称为简单模或单工序模,如落料、冲孔。
第二种
级进模(连续模、跳步模):在压力机一次冲程中,级进模在其有规律排列的几个工位上分别完成一部分冲压工序,最后工位冲出完整的工件,如锁壳、球形把手等。级进模生产效率高,适用于大批量生产;极进模可以减少模具的数量和设备数量,操作方便安全,便于实现冲压生产自动化。但级进模结构复杂,制造困难,制造成本高,而且模具的定位产生的累积误差会影响工件的精度。因此级进模多用于生产批量大、精度要求不高、需要多工序冲压的小零件加工。
第三种
复合模:在压力机一次冲程中,经一次送料定位,在摸具的同一部位可以同时完成几道冲压工序的模具成为复合模。如日常用品中金属或铝制的锅、盆。复合模与连续模相比,其冲压件精度高,对条料的定位精度要求低,模具的轮廓尺寸小。但复合模结构复杂,制造精度要求高、制造难度大。复合模适用于生产批量大、精度要求高、内外形尺寸差较大的冲压件。
焊接
定义:两种或两种以上材质(同种或异种),通过加热或加压或二者并用,并且用或不用填充材料,来达到原子扩散和结合而形成永久性连接的工艺过程。工件可以用各种同类或不同类的金属、非金属材料(塑料、石墨、陶瓷、玻璃等),也可以用一种金属与一种非金属材料。金属的焊接在现代工业中具有广泛的应用,因此狭义地讲,焊接通常就是指金属材料的焊接。
分类:按照焊接过程中金属材料所处的状态不同,目前把焊接方法分为以下三类:
电弧焊
由焊接电源供给的,在两极间产生强烈而持久的气体放电现象叫电弧。电弧焊是一组焊接过程,通过电弧加热金属并把它们焊接连接起来,
可以或者不使用压力,可以或者不使用填充材料。它是一种基本的金属处理方法,被广泛运用于国民经济各部门。
氩弧焊
定义:氩弧焊是利用氩气作为保护介质的一种电弧焊方法。
特性:氩气是一种惰性气体,它既不与金属起化学反应使被焊金属氧化,亦不溶解于液态金属。因此,可以避免焊接缺陷,获得高质量的焊缝。氩弧焊时,由于氩气的电离势较高,故引弧较困难,为此常借用高频振荡器产生高频高压电来引弧。由于氩气的散热能力较低,因而一旦引燃后,就能较稳定地燃烧。
分类:氩弧焊按所用的电极不同分为两种:
附加知识点:氩弧焊的电流密度大,发出的光比较强烈,它的电弧产生的紫外线辐射,约为普通焊条电弧焊的5~30倍,红外线约为焊条电弧焊的1~1.5倍,在焊接时产生的臭氧含量较高,所以通常需在通风地方实施。目前市场上有三种氩气:普氩(纯度99.6%左右)、纯氩(纯度99.9%左右)、高纯氩(纯度99.99%),前两种可焊接碳钢和不锈钢;焊接铝及铝合金、钛及钛合金等有色金属一定要选用高纯氩;避免焊缝及热影响区被氧化无法进行焊接。
二氧化碳焊
定义:用纯度> 99.98% 的二氧化碳做保护气体,以焊丝作为电极,以自动或半自动的方式进行焊接,称为二氧化碳保护焊。
特点:
焊缝成形差,飞溅大。烟雾较大,控制不当易产生气孔。
适用范围:
CO2保护焊适用于低碳钢和强度级别不高的普通低合金钢焊接,主要焊接薄板。
车
车削中工件旋转,形成主切削运动。刀具沿平行旋转轴线运动时,就形成内、外圆柱面。刀具沿与轴线相交的斜线运动,就形成锥面。仿形车床或数控车床上,可以控制刀具沿着一条曲线进给,则形成特定的旋转曲面。采用成型车刀,横向进给时,也可加工出旋转曲面来。车削还可以加工螺纹面、端平面及偏心轴等。车床主要用于加工各种回转表面和回转体的端面,在车床上还能做钻孔、扩孔、铰孔、滚花等工作。因车床用途广泛也称之为万能机床。
钻
在钻床上,用钻头旋转钻削孔,是孔加工的最常用方法。钻削的加工精度较低,在钻削后常常采用扩孔和铰孔来进行半精加工和精加工。扩孔采用扩孔钻,铰孔采用铰刀进行加工。扩孔、铰孔时,钻头、铰刀一般顺着原底孔的轴线,无法提高孔的位置精度。镗孔可以较正孔的位置。镗孔可在镗床上或车床上进行。
镗
镗刀基本与车刀相同,不同之处是工件不动,镗刀在旋转。适用于机械加工车间对单件或小批量生产的零件进行平面铣削和孔系加工,主轴箱端部设计有平旋盘径向刀架,能精确镗削尺寸较大的孔和平面。此外还可进行钻、铰孔及螺纹加工。
铣
刨
插
拉
磨
抛光
夹具:
定义:机床上用以装夹工件(和引导刀具)的一种工艺装置。其作用是将工件定位,以使工件获得相对于机床和刀具的正确位置。
分类:
胎具
一种样板,以钻孔胎具最为多见。用钻孔胎具钻孔省去画线、钻孔,提高了精度和效率。如锁芯、锁头和弹子孔的加工。
电火花
线切割
定义:属于电火花加工的一种,采用线电极加工工件,是电、热和流体动力综合作用的结果。
特点:
与电火花所不同的是,电火花线切割加工不需要制作复杂的成形电极,而是用不断移动的电极丝作为工具,工件则按预定的轨迹进行运动而“切割”出所需的复杂零件。电火花线切割加工只能加工以直线为母线的曲面,而不能加工任意空间曲面。
数控加工
数控加工,就是在对工件材料进行加工前,事先在计算机上编写好程序,再将这些程序输入到使用计算机程序控制的机床进行指令性加工,或者直接在这种使用计算机程序控制的机床控制面板上编写指令进行加工。加工的全过程包括走刀、换刀、变速、变向、停车等,都是自动完成的。数控加工是现代化模具制造加工的一种先进手段,当然,数控加工手段并不一定只用于加工模具零件,用途十分广泛。
加工中心
定义:属于数控加工的一种。是指备有刀库,具有自动换刀功能,对工件一次装夹后进行多工序加工的数控机床。加工中心是高度机电一体化的产品,工件装夹后,数控系统能控制机床按不同工序自动选择、更换刀具,自动对刀、自动改变主轴转速、进给量等,可连续完成钻、镗、铣、铰、攻丝等多种工序。因而大大减少了工件装夹时间,测量和机床调整等辅助工序时间,对加工形状比较复杂,精度要求较高,品种更换频繁的零件具有良好的经济效果。
分类:加工中心通常以主轴与工作台相对位置分类,分为卧式、立式和万能加工中心。
其他加工方法:
选择加工方法主要考虑零件表面形状、尺寸精度和位置精度要求、表面粗糙度要求,以及现有机床、刀具等资源情况、生产批量、生产率和经济技术分析等因素。其他加工方法还有化学加工(CHM)、电化学加工(ECM)、电化学机械加工(ECMM)、电接触加工(RHM)、超声波加工(USM)、激光束加工(LBM)、离子束加工(IBM)、电子束加工(EBM)、等离子体加工(PAM)、电液加工(EHM)、磨料流加工(AFM)、磨料喷射加工(AJM)、液体喷射加工(HDM)及各类复合加工等。
公差、配合和表面粗糙度
以上讲的多种加工方法车、铣、刨、磨、镗、冲压等,都离不开公差配合和表面粗糙度。下面简要介绍一下公差配合常用的术语及其定义。
2. 轴:通常指圆柱形外表面,也包括非圆柱形外表面(由两反向的平行面或切面形成的被包容面)。如锁芯(锁胆为轴形零件)。
孔和轴都是尺寸要素,锁头、孔,锁芯与孔配合为轴孔配合。例如下图所示两零件的各表面中,两表面(或切面)相对、其间没有材料的称为内表面,或包容面;两表面(或切面)相背,其外没有材料的称为外表面,或被包容面。图中由D1、D2、D3和D4各尺寸所确定的内表面都称为孔。由d1、d2、d3和d4各尺寸所确定的外表面称为轴。若两表面(或切面)同向,其间和其外均有材料,形不成包容或被包容状态的,则既不是内表面,也不是外表面,它们既不能称为孔,也不能称为轴。如图中由L1、L2和L3各尺寸所确定的表面(或切面)。
3. 基本尺寸:在参数设计过程中,根据各种条件或要求,经过计算或直接选用的尺寸(图纸尺寸),如锁芯一般为Φ12.5~Φ13。
4. 实际尺寸:加工后通过测量得到的尺寸。如设计尺寸为Φ13,但由于机床本身精度高低、操作人员技术水平的高低、测量工具误差等因素造成实际尺寸有可能大于或小于基本尺寸。
5. 极限尺寸:允许尺寸变化的界限值称为极限尺寸。通常,设计给出两个极限尺寸,其中一个是允许的最大尺寸,称为最大极限尺寸,另一个是允许的最小尺寸,称为最小极限尺寸。极限尺寸是在公差设计时,以基本尺寸为基数确定的。只要加工零件尺寸在最大和最小极限尺寸之内,就为合格零件。
6. 上偏差:最大极限尺寸减基本尺寸所得的代数差,称为上偏差
基本尺寸为13,最大极限尺寸为13.2,那上偏差为13.2-13=+0.20;
基本尺寸为13,最大极限尺寸为13,那上偏差为13-13=0;
基本尺寸为13,最大极限尺寸为12.9,那上偏差为12.9-13=-0.10。
7. 下偏差:最小极限尺寸减基本尺寸所得的代数差,称为下偏差。
基本尺寸为13,最小极限尺寸为13.1,那下偏差为13.1-13=+0.10;
基本尺寸为13,最小极限尺寸为12.8,那下偏差为12.8-13=-0.20;
基本尺寸为13,最小极限尺寸为13,那下偏差为13-13=0。
根据设计要求的不同,极限尺寸可能大于、小于或等于基本尺寸,所以,极限偏差可能为正值、负值或零。但上偏差总是大于下偏差。
8. 上、下偏差的标注:上偏差标注在基本尺寸右上方,下偏差标注在基本尺寸的右下方。
9. 公差:允许的尺寸变动量,称为尺寸公差,简称公差。公差等于最大与最小极限尺寸之差,也等于上偏差与下偏差之差。公差永远为正值,因为极限最大尺寸永远大于最小极限尺寸。如同上偏差永远大于下偏差一样。所以有人说负公差是不对的。如
Φ 13+0.15-0.10 基本公差为0.15-(-0.10) = 0.25。
例:Φ13+0.15-0.10 ,基本尺寸为Φ13,最大极限尺寸为Φ13.10,最小极限尺寸为Φ13.06,上偏差为+0.10,下偏差为+0.06,公差为0.04,合格尺寸在Φ13.10~Φ13.06之间
10. 配合:基本尺寸相同的、相互结合的孔和轴之间的松紧程度。
11. 间隙配合(动配合):保证具有间隙(包括最小间隙等于零)的配合,称为间隙配合。孔直径大于等于轴直径的配合即为间隙配合,如锁芯与孔的配合。 孔Φ13+0.10+0.04 ,轴Φ13 +0.020 ,
孔永远大于轴,孔做成最小,轴做成最大,孔也比轴大。
12. 过盈配合(静配合):保证具有过盈(包括最小过盈等于零)的配合,称为过盈配合。轴直径大于等于孔直径的配合即为过盈配合,如销与销孔的配合。 孔Φ13 +0.10+0.04 轴Φ13 +0.14+0.12
, 轴永远大于孔,轴做成最小,孔做成最大,轴也比孔大.
13. 过度配合:可能具有间隙也可能具有过盈的配合,称为过度配合。如齿轮与轴、轴承与孔的配合。 孔Φ13+0.10+0.04 轴Φ13 +0.12+0.02 当孔做成最大Φ13.1时,轴做成最小Φ13.02时出现间隙配合;当孔做成最小Φ13.04,轴做成最大Φ13.12时轴与空出现过盈配合。根据使用要求、不同精度和不同等级,查国标能得到满意的配合.
14. 配合公差:间隙公差和过盈公差亦可称为配合公差。
15.
基孔制:基本偏差为一定的孔与不同基本偏差的轴形成各种标准配合的制度。基孔制中,孔是基准件,称为基准孔;轴为非基准件,称为配合轴。基准孔的基本偏差规定为下偏差,并且等于零,并以基本偏差代号H表示,上偏差则永远为正值。 如Φ50H11,Φ50-基本尺寸,H-基孔制,11–公差等级,精度为 +0.16+0, 也可标注为Φ50 +0.16+0, 做轴孔配合时可变轴为Φ50-0.05-0.08 为间隙配合;轴为Φ50 +0.20+0.18为过盈配合;轴为Φ50 +0.18-0.06为过渡配合。
16.
基轴制:基本偏差为一定的轴与不同基本偏差为孔形成各种标准配合的制度。基轴制中,轴是基准件,称为基准轴;孔为非基准件,称为配合孔。基准轴的基本偏差为上偏差,并且等于零,并以基本偏差代号h表示,下偏差则永远为负值。如Φ50h11,Φ50-基本尺寸,h-基轴制,11–公差等级,精度为+0-0.16,也可标注为Φ50+0-0.16.
17. 在工作中应首先选用基孔制,为因孔难加工,精度不好掌握,轴好加工,便于修整,所以一般改变轴的尺寸,来达到不同配合要求。如锁头中的锁芯和孔。如Φ13H10的孔配的锁芯Φ13+0.07+0,为适应锁芯的灵活度,可改变锁芯尺寸以达到要求。
18. 表面粗糙度:零件的加工表面上程微小峰谷状的微观几何形状误差。一般是对比测量,有一事先制造的样板,并标明粗糙度数值.
19. 形状和位置公差:在图纸上除有尺寸公差外,还有形状和位置误差。如加工件是否平直、同心等。
Sat
11
Oct
2014
要能在不知道号码锁的情况下去打开一个保险柜上的密码锁,需要对保险柜锁和密码盘有充分的了解,和对保险柜的构造具有广泛的知识,以及积累的经验,才能在短时间内,运用最有效的方法和工具,达到后欲的目的.即使有时不免要损伤到锁或保险柜,但在专业的技术下,可以将损伤到最小的程度,并可以事后修复如初.
目前最常用的开启保险柜锁有三种方法,一是拔码,就是用拔码器把刻度盘用拔码器拉出来,,
二是用钻探法,即在刻度盘的九点钟方向钻上一个小洞,然后用钢线把几个轮片上的缺口拨动成一条线,对着杠杆就可以打开保险柜锁,这种方法比较快,但需要有一定的知识,参考资料,特殊的工具.才能奏效.常用的工具有电钻,特殊的钻头和视镜等,钻头必须要够坚硬才能钻得通保险柜的箱门及号码盘上的数层钢板,然后才看得清保险柜锁内部的轮片的旋转情况,才好用钢线拨动轮片.把它几组的缺口对齐在九点钟的方向,(即杠杆的方向)这样才能打开保险柜锁.,
三是试探法,也就是我们常说的推码法,推码法是最具有技术性,并不用使用任何工具.而是凭着个人的丰富经验和对保险柜锁的知识,凭着感觉,听着轮片的转动和杠杆达到掉落点的声音,以及拨动号码盘的顺序等,加以试验并用笔记录在纸上,然后予以分析来推理,找出开锁几组号码和顺序.
有些国产的号码锁,如用在衣柜,公文柜,抽屉柜上的号码锁等,比较起来不算太精密,而且又是用手来转动门外的把手以拉退锁闩.在这种情况下,有经验的锁匠常首先用手来施加压力于门外的把手转向开锁的方向.然后用另外一只手来慢慢转动刻度盘,一定会有感觉到有一小阶段的刻度盘以内,刻度盘的转动好像被卡住了的现象,常常是最后一组的开锁号码就在这一小阶段.你再想象刻度盘上的号码基本上都呈品字形的多,你再想象在这等三角形的范围内,经常会有这三组开锁的号码所以你必须要有耐心的寻找它作试探来找出开锁的号码,,同时要配合感觉和听觉,(当然最好能带上听诊器,或者助听器,)有时只需用几次就能把保险柜锁打开.
Sat
11
Oct
2014
There is a very good reason why even the commercial locksmiths among you have not sold many electronic access control (EAC) solutions for interior office doors and smaller businesses. Most EAC systems are simply too powerful and, as a result, too costly and disruptive to put on the scores of interior doors in Class A and Class B commercial real estate buildings. To provide EAC to office space entries, interior offices, conference rooms, equipment rooms and IT rooms in commercial real estate buildings, within tenant offices, at school administration offices, government offices and scores of other buildings ranging from those housing ambulatory care to manufacturing facilities, a less expensive and less disruptive, right-sized solution has been needed. This brings up another reason why you always need to go through the latest edition of Locksmith Ledger. Manufacturers are always working on ways to provide you - and them - with increased revenues and market segment growth opportunities. They are also quite aware that the interior door market is a big security and access management retrofit opportunity. And, recently, they have come up with a solution and a significant opportunity for locksmiths everywhere. A new wireless standalone locking system enables the transition from mechanical to electronic access at a fraction of the cost of traditional wired solutions. Developed specifically for facilities that want to upgrade from mechanical locks and keys to electronic credentials for improved security and efficiency, wireless locks are ideal for interior office doors, common area doors and sensitive storage spaces at a fraction of the cost of traditional EAC. Programming is easy. All the administrator needs is a lock and a free mobile app. The locks simplify installation by combining the lock, credential reader, door position switch and request-to-exit switch together into one unit. They have identical door preps to mechanical locks so they can be can be easily interchanged without having to replace the door or the frame. Installation is complete within 15 minutes using only a Phillips screwdriver, with no additional holes to drill or wires to run to the opening. Additionally, lever handing is field reversible in seconds, so there is no need to worry if it is a left or right-handed door. Leveraging web-based and mobile apps makes it simple for you to commission and even easier for your customer to configure lock settings, add users and view audits and alerts fromanywhere. When connected to the Internet, these devices use Wi-Fi to update the locks automatically once a day, eliminating the need to update locks on site as with traditional offline electronic locks. Or, using a downloadable free app and a mobile device, administrators can approach the individual locks and use the Bluetooth Low Energy technology on their smart phone or tablet, to program them. Thus, for small to mid-sized businesses, an affordable EAC solution can deliver new levels of security and flexibility in addition to cost savings associated with re-keying. Ellectronic credentials, which are easily issued on cards or smart phones, reduce the need for service calls related tolockouts and re-keying. Access privileges can be quickly assigned and revoked electronically by the office administrator, making them ideal for employees, contract workers, visitors and service providers. Most importantly, such wireless standalone locks let property owners and managers leverage their existing electronic credentials throughout the building, outside and inside. That's something that they have been wanting and that makes this retrofit project much easier to sell.
Sun
14
Sep
2014
Aria locksmith can provide you fast hassle free car door unlocking service . example of models including many high security cars:
BMW
1series, 3 series, 5 series, 7 series
Volkswagen
Passat;Polo;Golf;GTI;Lupo;Phaeton;Sharan;Touareg;Transporter,Beetle
Bora,Cabrio,Cabriolet,Caddy,Jetta,GOL
Audi
A2;A3;A4;A6;A8;AllroadQuattro;Avant;Cabriolet;Coupe;S2 Coupe;S3;S4;S6;S8;TT
SEAT
Alhambra ,Altea,Arosa,Cordoba,Ibiza,Inca Van,Leon,Toledo
FORD
FORD-GALAXY
Porsche
911,912,Boxter,Cayenne
悉尼小伞锁匠aria locksmtih 可以为您提供方便快捷开车锁服务, 包含各类高级车型车锁, 举例如上。